WHICH TERM IS USED WHEN SEPARATION OF PRIVILEGE IS APPLIED TO PEOPLE?

Qualified Writers
Rated 4.9/5 based on 2480 reviews

100% Plagiarism Free & Custom Written - Tailored to Your Instructions

Question 1                                                                                          Marked out of 1.00

 

Which term is used when separation of privilege is applied to people?

 

Select one:

 

  1. Nonrepudiation
  2. Security through obscurity
  3. Diversity of defense
  4. Separation of duties

 

Question 2                                                                                          Marked out of 1.00

 

Which statement describes why social engineering is successful?

 

Select one:

 

  1. People tend to forgo personal egos to better an organization.
  2. People have a basic desire to be helpful.
  3. People with a higher status may be coerced into providing information to those of lower status.
  4. People have a basic desire to withhold information for personal gain.

 

Question 3                                                                                          Marked out of 1.00

 

The principle of open design holds that the protection of an object should rely upon secrecy of the protection mechanism itself.

 

Select one:

 

  1. False
  2. True

 

Question 4                                                                                          Marked out of 1.00

 

Which password is weakest?

 

Select one:

 

  1. [email protected]$$w0rd
  2. H#e31L9pM3
  3. C#as%t*1ng
  4. [email protected]@!

 

Question 5                                                                                          Marked out of 1.00

 

Which attack is an example of an advanced persistent threat (APT) first reported by Google, but also targeting Adobe, Yahoo, Juniper Networks, Rackspace, Symantec, and several major U.S. financial and industrial firms?

 

Select one:

 

  1. Operation Aurora
  2. Conficker
  3. Stuxnet
  4. Operation Bot Roast

 

Question 6                                                                                          Marked out of 1.00

 

The entity that implements a chosen security policy and enforces those characteristics deemed most important by the system designers is known as the

 

Select one:

 

  1. CIA model
  2. Group policy
  3. Security model
  4. NIST Cyber Security Framework

 

Question 7                                                                                          Marked out of 1.00

 

Which security model uses transactions as the basis for its rules?

 

Select one:

 

  1. Simple Security
  2. Bell-LaPadula
  3. Biba
  4. Clark-Wilson

 

Question 8                                                                                          Marked out of 1.00

 

What is the first step an administrator can take to reduce possible attacks?

 

Select one:

 

  1. Install anti-spyware software.
  2. Ensure all patches for the operating system and applications are installed.
  3. Configure an intrusion detection system.
  4. Install a firewall.

 

Question 9                                                                                          Marked out of 1.00

 

What condition is described by the van Eck phenomenon and studied under TEMPEST?

 

Select one:

 

  1. Electromagnetic pulses destroying sensitive computer equipment
  2. Magnetic fields that interfere with signals crossing Local Area Network (LAN) cables
  3. Electromagnetic eavesdropping
  4. Piggybacking on electromagnetic communications

 

Question 10                                                                                        Marked out of 1.00

 

In 2014, on how many different threat actors, including criminals, hactivists, state-sponsored groups, and nation states, did CrowdStrike report?

 

Select one:

 

  1. 39
  2. 29
  3. 19
  4. 49

 

Question 11                                                                                        Marked out of 1.00

 

The biggest change affecting computer security that has occurred over the last 30 years has been the transformation of the computing environment from a highly interconnected network of smaller systems to large mainframes.

 

Select one:

 

  1. False
  2. True

 

Question 12                                                                                        Marked out of 1.00

 

Which statement accurately describes how pharming is accomplished?

 

Select one:

 

  1. The user is directed to a fake web site as a result of modification of local host files, which are used to convert URLs to the appropriate IP address.
  2. The attacker acts as a custodian and while watering the organization`s plants, he places cameras to record keystrokes.
  3. The attacker gathers prominent bits of information from the organization`s recycling/trash.
  4. The attacker attempts to engage the target in conversation and tries to evoke sympathy so that the target feels sorry for the individual and is more prone to provide information.

 

Question 13                                                                                        Marked out of 1.00

 

What type of authentication mechanism is a fingerprint?

 

Select one:

 

  1. Something you do
  2. Something you have
  3. Something you know
  4. Something about you

 

Question 14                                                                                        Marked out of 1.00

 

Which statement identifies a good first step for companies to take to fight potential social engineering attacks?

 

Select one:

 

  1. Buy the latest virus protection software and install on the systems.
  2. Establish policies and procedures dictating the roles and responsibilities all users, as well as security administrators.
  3. Conduct background checks on all contractors, consultants, delivery persons, and partners that may have access to the facilities.
  4. Monitor all phone calls and check logs on a daily basis.

 

Question 15                                                                                        Marked out of 1.00

 

In many early cases of computer crime, the perpetrator of the crime intended to cause damage to the computer.

 

Select one:

 

  1. False
  2. True

 

Question 16                                                                                        Marked out of 1.00

 

Which cell phone network component consists of antennas, receivers, transmitters, and amplifiers?

 

Select one:

 

  1. The base stations
  2. The wires carrying the signal
  3. The phones themselves
  4. The hardware and software that allows communication

 

Question 17                                                                                        Marked out of 1.00

 

What common password character combinations do users tend to use when creating passwords?

 

Select one:

 

  1. Numbers only
  2. All capital letters
  3. Passwords that are too long
  4. Names of family, pets, or teams

 

Question 18                                                                                        Marked out of 1.00

 

Which Internet criminal is famous for conducting his attacks using a number of different tools and techniques, including social engineering, sniffers, and cloned cellular telephones?

 

Select one:

 

  1. Kevin Mitnick
  2. Timothy Lloyd
  3. David Smith
  4. Robert Morris

 

Question 19                                                                                        Marked out of 1.00

 

Which statement describes an advantage of using biometrics for physical access control?

 

Select one:

 

  1. Biometrics are 100 percent effective.
  2. The individual always has the biometric in their possession.
  3. Hand geometry requires a fairly small device.
  4. Biometrics is a less sophisticated access control approach.

 

Question 20                                                                                        Marked out of 1.00

Which term describes communication that is designed so that devices can talk directly with each other without having to go through a central device?

 

Select one:

 

  1. Pass-thru communication
  2. Peer-to-peer communication
  3. Direct media communication
  4. Client-server communication

 

Question 21                                                                                        Marked out of 1.00

 

Which term refers to the mechanisms used to ensure that physical access to computer

systems and networks is restricted to authorized users?

 

Select one:

 

  1. Due diligence
  2. Physical security
  3. TEMPEST
  4. Intrusion detection system (IDS)

 

Question 22                                                                            Marked out of 1.00

 

TEMPEST is a program developed by the U.S. Department of Defense to protect equipment from the ill effects of weather and other natural disasters.

 

Select one:

 

  1. False
  2. True

 

Question 23                                                                                        Marked out of 1.00

 

For many years, the focus of security was on prevention.

 

Select one:

 

  1. False
  2. True

 

Question 24                                                                                        Marked out of 1.00

 

What is the most common authentication mechanism?

 

Select one:

 

  1. Magnetic card strip
  2. Signature
  3. Password
  4. Fingerprint

 

Question 25                                                                                        Marked out of 1.00

 

Biometrics suffer from false positives and false negatives, making them less than 100 percent effective.

 

Select one:

 

  1. False
  2. True

Price: £109

100% Plagiarism Free & Custom Written - Tailored to Your Instructions