CYSE 101 FINAL questions with complete solutions 2023
CYSE 101 FINAL questions with complete solutions 2023Cybersecurity countermeasures are: the tools and techniques we use to reduce risk One vulnerability in air traffic control system case was unauthenticated messages What does non-repudiation mean? suffuncent evidence exists such taht a user cannot deny an action What is the Parkerian hexad compared to the CIA triad Parkenian has 6 elements including the 3 from the CIA but is not as widely known Why does access control based on the Media Access Control (MAC) address of the systems on our networek not represent storng security MAC addresses can be easily spoofed or changed What is the difference between authentication and accountability Authentication proves who you are and accountability records what you did In the Maroochy Shire case, the actual threat was: A disgruntled former employee What is the difference between Mandatory Access Control (MAC) and Discretionary Access Control (DAC) In DAC, the owner of the resource determines access; in MAC, the owner of the resource does not determine access In the Yahoo breach, attackers stole: User information The Dark Overlord case discussed by our guest speaker involved: physical threats and a financial demand What is the difference between vulnerability assessment and penetration testing? Penetration testing is more in depth than vulnerability assessment A simple vulnerability assessment probe: exhaustively exploits all possible vulnerabilites What was stolen in the OPM breach? Fingerprint, personal information, security clearance application data The cuckoo's egg story had to do with A cyber attack If a Unix file has permissions 654 who can read and execute Group Computer log entries: May contain user and remote system information the file /etc/shadow on a Unix system contains user names and hashed passwords What do we call the rate at which we fail to authenticate legitimate users in a biometric system? False Rejection Rate (FRR) The traceroute command tells you: The network path between two systems What is the key point of Kerckhoffs second principle (i.e., the one principle most applicable to modern cryptographic algorithms)? it is OK if the enemy knows the cryptographic system The Mirai bot net case: Used IoT devices for DDoS attack
Written for
- Institution
- CYSE
- Course
- CYSE
Document information
- Uploaded on
- March 3, 2023
- Number of pages
- 10
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cyse 101 final questions with complete solutions 2023
-
cybersecurity countermeasures are the tools and techniques we use to reduce risk
-
one vulnerability in air traffic control system case was unauthe
Also available in package deal