RATIONALIZED ANSWERS 100%
GUARANTEE PASS
u Biometrics have a fault tolerance of 0. - Correct answer.False
DRM possess no dilemma for vendors, only for the users. - Correct answer.False
Defines a user group, which serves as another set of user for whom we specify rights. - Correct
answer.Group right
Elliptic curve cryptography uses the equation C = M e mod N for encryption - Correct answer.False
Every executable file begins with a "file header" that describes the structure and format of the program.
- Correct answer.True
For encryption to work there must always be a matching decryption algorithm. - Correct answer.True
Hashing: - Correct answer.transforms readable text into gibberish
If the "root" user accesses a file, the system grants full access - Correct answer.True
In 1988, researcher Fred Cohen performed a series of studies in which he constructed programs that
replicated themselves. He used the term computer infection to describe them. - Correct answer.False
In Windows, when you copy a file from one folder to another and the folders have different access
permissions, the file: - Correct answer.takes on the access rights of the destination folder
, In a password system, the total number of possible passwords is called - Correct answer.search space
In the early 1980s, a rumored macro virus infected Microsoft Word documents. When executed, the
virus copied itself to other Word files it could find and also posted the document to the Usenet News
system. - Correct answer.False
Key Encapsulation with the term key wrapping is used when the KEK is the secret key. - Correct
answer.True
Low-hanging fruit refers to the easiest targets in an attack. - Correct answer.True
Most Microsoft Windows fatal errors (blue scree of death) are caused by - Correct answer.Device Drivers
Not all data is strictly numerical. - Correct answer.True
Sharing on a computer system includes two main types of policies, global and tailored. - Correct
answer.True
Steganography is a type of vault computer-based access control - Correct answer.False
The Advanced Encryption Standard (AES) is stronger than the Data Encryption Standard (DES). - Correct
answer.True
The computer connection that allows you to attach several separate components is called: - Correct
answer.a bus
The following are steps a digital forensic investigator takes when collecting evidence except: - Correct
answer.analyze the evidence
The law that establishes security measures that must be taken on health-related information is: -
Correct answer.HIPAA