Principles of Cybersecurity Final Study Set 2023 with complete solutions
True correct answersT/F: Identification is the means of establishing the validity of a claimed identity provided by a user. True correct answersT/F: An auditing function monitors and keeps a record of user accesses to system resources. identification correct answersAn authentication process consists of the ____ step and the verification step. System Integrity correct answers________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system cryptanalytic correct answersA ______ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. False correct answersT/F: A user program executes in a kernel mode in which certain areas of memory are protected from the user's use and certain instructions may not be executed. password cracker correct answersA __________ is a password guessing program. True correct answersT/F: In a biometric scheme some physical characteristic of the individual is mapped into a digital representation. True correct answersT/F: A user may belong to multiple groups. denial-of-service correct answersA ______ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.
Written for
- Institution
- Principles of Cybersecurity
- Course
- Principles of Cybersecurity
Document information
- Uploaded on
- September 5, 2023
- Number of pages
- 11
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
principles of cybersecurity final study set
Also available in package deal