Title | Quiz 1 Information Security |
---|---|
Author | Hasan Hasan |
Course | Information Security |
Institution | Charles Sturt University |
Pages | 2 |
File Size | 83.4 KB |
File Type | |
Total Downloads | 81 |
Total Views | 170 |
Assignment 1 and 2 and 3 with lecture notes and marked assignments....
Question 1 In biometrics the key issue is
Correct Answer: whether the rate of false positives and false negatives is acceptable. Question 2 Which one of the following implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance?
Correct Answer: access control Question 3 Interruption affects which one of the following?
Correct Answer: availability Question 4 A malicious attacker must have the following to ensure success:
Correct Answer: method, opportunity and motive. Question 5 Modification of information means
Correct Answer: an unauthorised party not only accesses but tampers with an asset. Question 6 A concept that evolved out of requirements for military information security is called
Correct Answer: mandatory access control. Question 7 Spoofing represents an attack against data
Correct Answer: confidentiality. Question 8 Authentication is based on something
Correct Answer: all the given options Question 9 Which of these is the process to determine if the credentials given by a user or another system are authorised to access the network resource in question?
Correct Answer: authentication Question 10 __________ is based on the roles the users assume in a system rather than the user’s identity.
Correct Answer: RBAC Question 11 Recognition by fingerprint, retina and face are examples of
Correct Answer: static biometrics. Question 12 The security triad is built around the following properties:
Correct Answer: confidentiality, availability and integrity. Question 13 Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the
Correct Answer: verification step. Question 14 Which of the following strategies is one in which the system periodically runs its own password cracker to find guessable passwords?
Correct Answer: reactive password checking Question 15 A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is called a/an
Correct Answer: vulnerability....