· Question 1
0.333 out of 0.333 points
A concept that evolved out of requirements for military information security is called ___________.
|
|||||||||||
|
· Question 2
0.333 out of 0.333 points
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is called____________.
|
|||||||||||
|
· Question 3
0.333 out of 0.333 points
A malicious attacker must have the following to ensure success:
|
|||||||||||
|
· Question 4
0.333 out of 0.333 points
Authentication is based on something
|
|||||||||||
|
· Question 5
0.333 out of 0.333 points
In biometrics the key issue is:
|
|||||||||||
|
· Question 6
0.333 out of 0.333 points
Interruption affects which one of the following?
|
|||||||||||
|
· Question 7
0.333 out of 0.333 points
Modification of the information means:
|
|||||||||||
|
· Question 8
0.333 out of 0.333 points
Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.
|
|||||||||||
|
· Question 9
0.333 out of 0.333 points
Recognition by fingerprint, retina, and face are examples of __________.
|
|||||||||||
|
· Question 10
0.333 out of 0.333 points
Spoofing represents an attack against data.....................
|
|||||||||||
|
· Question 11
0.333 out of 0.333 points
The security triad is built around the following properties:
|
|||||||||||
|
· Question 12
0.333 out of 0.333 points
Which of the following strategy is one in which the system periodically runs its own password cracker to find guessable passwords?
|
|||||||||||
|
· Question 13
0.333 out of 0.333 points
Which of these is the process to determine if the credentials given by a user or another system are authorized to access the network resource in question?
|
|||||||||||
|
· Question 14
0.333 out of 0.333 points
Which one of the following implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.
|
|||||||||||
|
· Question 15
0.333 out of 0.333 points
__________ is based on the roles the users assume in a system rather than the user’s identity.
|
|||||||||||
|
Hai can I know additional information
ReplyDelete