INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
0 view 0 purchase
Course
INF4831
Institution
INF4831
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
The following are logical controls:
encryption, passwords and usernames.
Threats exploit or take advantage of existing vulnerabilities.
True
A vulnerability
is a weakness that can be used to harm us.
T...
inf4831 information security questions and answers
Written for
INF4831
All documents for this subject (31)
Seller
Follow
SUPERGRADES01
Reviews received
Content preview
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS
A+ GRADED. Buy Quality Materials!
The following are logical controls:
encryption, passwords and usernames.
Threats exploit or take advantage of existing vulnerabilities.
True
A vulnerability
is a weakness that can be used to harm us.
The chief security officer for your company creates a new set of security
guidelines in order to keep customers data more secure. This is an example of
administrative control
The Parkerian hexad is the oldest and simplest model used to discuss
information security issues.
False
Defense in depth is a concept which
advocates multiple layers should be used to help prevent information security attacks.
Confidentiality refers to
keeping information private
Preserving the integrity of information means
Preventing information from being favricated, modified or interrupted
Which category of attack is an attack against confidentiality
Interception
Insuring information is available means preventing it from being fabricated,
modified or interrupted
False
If we are using an identification card as the basis of our authentication scheme,
what step might we add to the process to move to multifactor authentication?
A software-based security token
What is identity verification?
Support for the claim of what someone or something is.
What biometric factor describes how well a characteristic resists change over
time?
Permanence
Which of the following is not a factor in the performance of a biometric system?
False acquaintances
Biometric identifiers are impossible to falsify.
False
What do we call the process in which the client authenticates to the server and
the server authenticates to the client?
Mutual authentication
The most complex passwords consists of.
uppercase and lowercase letters and numbers and symbols.
, Which of the following is not a biometric identifier?
A complicated password.
Identification
is the claim of what someone or something is.
What is authentication?
Establishment of whether a claim of identity is correct.
Establishment of whether a claim of identity is correct.
Authorization
CAPTCHA is an acronym which stands for
Completely Automated Public Turing test to tell Computers and Humans Apart.
This access control model allows the owner of a resource to decide who does
and does not have access.
Discretionary access control
Which type of access control would be used in the case where we want to prevent
users from logging in to their accounts after business hours?
Attribute-based access controls
Why does access control based on MAC addresses of the systems on our
network not provide strong security?
Because MAC addresses can be changed with software.
Network ACLs typically control access with Internet Protocol (IP) addresses,
Media Access Control (MAC) addresses and
ports
This process allows, limits, denies or revokes the uses of resources.
Access control
Access control lists (ACLs) are a very common choice of access control
implementation.
True
The two main methods of access controls are
access control lists and capabilities.
The principle of least privilege dictates
give bare minimum access to a user based on that user's functionality.
One benefit of logging is
it gives a history of activities that have taken place in a computing environment.
In nonrepudiation
sufficient evidence exists as to prevent denial of an action.
Authentication is provides a means to trace activities and accountability is a set
of methods used to establish identity.
False
Accountability is of little value against misbehavior
False
Some people consider accountability a bad idea because it
is akin to Big Brother watching over your shoulder.
The ultimate goal in performing assessments is to find and fix vulnerabilities
before attackers do.
True
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SUPERGRADES01. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.