Quiz 1 Information Security PDF

Title Quiz 1 Information Security
Author Hasan Hasan
Course Information Security
Institution Charles Sturt University
Pages 2
File Size 83.4 KB
File Type PDF
Total Downloads 81
Total Views 170

Summary

Assignment 1 and 2 and 3 with lecture notes and marked assignments....


Description

Question 1 In biometrics the key issue is 

Correct Answer: whether the rate of false positives and false negatives is acceptable. Question 2 Which one of the following implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance? 

Correct Answer: access control Question 3 Interruption affects which one of the following? 

Correct Answer: availability Question 4 A malicious attacker must have the following to ensure success: 

Correct Answer: method, opportunity and motive. Question 5 Modification of information means 

Correct Answer: an unauthorised party not only accesses but tampers with an asset. Question 6 A concept that evolved out of requirements for military information security is called 

Correct Answer: mandatory access control. Question 7 Spoofing represents an attack against data 

Correct Answer: confidentiality. Question 8 Authentication is based on something 

Correct Answer: all the given options Question 9 Which of these is the process to determine if the credentials given by a user or another system are authorised to access the network resource in question? 

Correct Answer: authentication Question 10 __________ is based on the roles the users assume in a system rather than the user’s identity. 

Correct Answer: RBAC Question 11 Recognition by fingerprint, retina and face are examples of 

Correct Answer: static biometrics. Question 12 The security triad is built around the following properties: 

Correct Answer: confidentiality, availability and integrity. Question 13 Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the 

Correct Answer: verification step. Question 14 Which of the following strategies is one in which the system periodically runs its own password cracker to find guessable passwords? 

Correct Answer: reactive password checking Question 15 A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is called a/an 

Correct Answer: vulnerability....


Similar Free PDFs