100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ABG 302 FINAL EXAM NEWEST $17.99   Add to cart

Exam (elaborations)

ABG 302 FINAL EXAM NEWEST

 0 view  0 purchase
  • Course
  • Institution
  • Book

ABG 302 FINAL EXAM NEWEST

Preview 2 out of 8  pages

  • September 17, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
ABG 302 FINAL EXAM NEWEST 2024 ACTUAL EXAM
COMPLETE 200 QUESTIONS AND CORRECT DETAILED
ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+
What are factors of authentication? - ANSWER: something you have, something you
know, something you are

The security goal that seeks to ensure that only authorized people are given access
is: - ANSWER: confidentiality

_________ are technologies to report alarm conditions to key personnel or remote
monitoring organizations. - ANSWER: remote notification systems

_________ is a condition monitoring system that can record and signal each time a
specific gate or door is unlocked (access granted) and what type of access is granted.
- ANSWER: unlocked condition monitoring

_________ are technologies used to report alarm conditions to key personnel or
remote monitoring organizations. - ANSWER: remote notification systems

_________ is the science, technique, and art of establishing a system of exclusion
and inclusion for tangible assets. - ANSWER: physical security

Securing which of the following involves controlling who can move (walk, drive, fly)
across the physical or logical line that marks this perimeter, such as property lines or
the exterior walls of a building or complex? - ANSWER: the outer perimeter

Which lens enables you to view an entire room but with some distortion of the
image? - ANSWER: fish-eye lens

Using natural design elements such as structures and landscaping to guide people as
they enter and exit spaces is referred to as: - ANSWER: natural access control

Which of the following options represent physical barriers? - ANSWER: a locked
door, a receptionist

Which of the following is not a subsystem involved in infrastructure security
management? - ANSWER: corporate cybersecurity policies

_________ is a report that incorrectly authenticates the individual, which could
provide access to equipment or data that this person should not have. - ANSWER:
false acceptance

The security goal that seeks continuous operation is: - ANSWER: availability

, _________ is a type of image sensor used in cameras designed to produce the
highest quality images. - ANSWER: charged coupled device

_________ is a type of camera that provides the best resolution in low-light
conditions. - ANSWER: infrared

This technical access control identifies the basic properties or characteristics of an
entity with regard to safeguarding information so that control decisions can be
dynamic and automated. - ANSWER: security attributes

A mathematical process or series of structured steps for performing some function. -
ANSWER: algorithm

Mechanisms or protections against behavior that is outside an expected norm -
ANSWER: controls

Biometrics are examples of which authentication factor? - ANSWER: inherence

Trying all possible keys until finding the right key: - ANSWER: brute force attack

This form of cryptography uses the same key to encrypt as it does to decrypt: -
ANSWER: symmetric

Collecting intelligence information from people as part of human intelligence is
known as: - ANSWER: social engineering

A non-encrypted message is: - ANSWER: plaintext

The act of unscrambling ciphertext into plaintext: - ANSWER: decryption

A password, passphrase, or PIN are examples of which authentication factor? -
ANSWER: knowledge

Malware that makes multiple copies of itself on a single computer until it clogs the
system: - ANSWER: rabbit virus

Which of the following are software development techniques intended to reduce the
frequency and severity of vulnerabilities in software: - ANSWER: modularity,
information hiding, encapsulation

The part of your computer that is the environment architecture, which abstracts the
low-level interfaces to bare processing hardware or peripherals. It allows convenient
use and interfaces to the user and hides the tedious low-level stuff, to include
resource scheduling and allocation, memory management, deadlock avoidance, and
interfaces for low-level hardware: - ANSWER: operating system

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller maxmaxwellmm254. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76669 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart