CYSE 101 FINAL REVIEW QUESTIONS
Which of the following would *not* be part of a solution in the Polycom case study? -
Answers-d. Off site backups
Which of the following is *not* true about complex and automatically generated
passwords that are unique to each system and are a minimum of 30 characters in
length, such as !Hs4(j0qO$&zn1%2SK38cn^!Ks620! ? - Answers-b. Brute force
password crackers will break them as quickly as a 4-digit PIN
Which of the following is true regarding the history of cybersecurity as presented in
class and the associated document? - Answers-a. Advances (firewalls, intrusion
detection, encryption algorithms, etc.) often followed attacks or apparent weaknesses
What does the concept of defense in depth mean? - Answers-d. Protect your data and
systems with tools and techniques from different layers
*D.
The primary vulnerability in the Lodz Tram Hack case study was: - Answers-b. Lack of
authentication
Considering the CIA triad and the Parkerian hexad, which of the following is true? -
Answers-b. Parkerian is more complete but not as widely known
In a data breach (such as the OPM case) which security characteristic of data has been
violated? - Answers-d. Confidentiality
What do we call the process in which the client authenticates to the server and the
server authenticates to the client? - Answers-d. Mutual authentication
*D
What do we call the rate at which we fail to authenticate legitimate users in a biometric
system? - Answers-a. False Acceptance Rate (FAR)
If we are using an identity card such as a driver's license as the basis for our
authentication scheme, which of the following additions would *not* represent
multifactor authentication? - Answers-d. A birth certificate
Which of the following is *not* a reason why an identity card alone might not make an
ideal method of authentication? - Answers-d. issued by the government
*D
, Which of the following would *not* be considered a logical (technical) control? -
Answers-a. fences
How do we know at what point we can consider our environment to be secure? -
Answers-d. Never; perfect security does not exist
Which of the following about vulnerabilities and threats is *not* true? - Answers-c.
Vulnerabilities and threats combine to create risk
A physical key (like for a door lock) would be described as which type of authentication
factor? - Answers-b. something you have
Which of the following is *not* true? - Answers-d. Voice authentication requires speech
to text capability
*D
What biometric factor describes how well a characteristic resists change over time? -
Answers-a. permanence
In the fake finger video from class, what was the printed circuit board used for? -
Answers-c. to etch the fingerprint
.
What is the difference between verification and authentication of an identity? - Answers-
d. verification is a weaker confirmation of identity than authentication
*D
If we are using an 4-character password that contains only lowercase English
alphabetic characters (26 different characters), how many *more* possible passwords
are there if we use a 5-character password (still only lowercase English alphabetic
characters? - Answers-a. 11,424,400 more possibilities
The confused deputy problem can allow unauthorized privilege escalation to take place;
how does this happen? - Answers-b. software has greater privilege than the user of the
software
Given a file containing sensitive data and residing in a Linux operating system with
some users who should not have access to the data, would setting the file's permissions
to rw-rw-rw- cause a potential security issue? - Answers-b. yes, because other users
can read and modify the file
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.