Computer Science > EXAM > CYSE 101 - JIM JONES| 110 questions| with 100% Correct Answers (All)

CYSE 101 - JIM JONES| 110 questions| with 100% Correct Answers

Document Content and Description Below

Which of the following is true regarding the history of cybersecurity as presented in class and the associated document? Correct Answer: Advances (firewalls, intrusion detection, encryption algorithm... s, etc.) often followed attacks or apparent weaknesses How do we know at what point we can consider our environment to be secure? Correct Answer: Never; perfect security does not exist Considering the CIA triad and the Parkerian hexad, which of the following is true? Correct Answer: Parkerian is more complete but not as widely known Which of the following would *not* be part of a solution in the Polycom case study? Correct Answer: Off site backups In a data breach (such as the OPM case) which security characteristic of data has been violated? Correct Answer: Confidentiality Which of the following would *not* be considered a logical (technical) control? Correct Answer: Fences The primary vulnerability in the Lodz Tram Hack case study was: Correct Answer: Lack of authentication Which of the following is *not* true about complex and automatically generated passwords that are unique to each system and are a minimum of 30 characters in length, such as !Hs4(j0qO$&zn1%2SK38cn^!Ks620! ? Correct Answer: Brute force password crackers will break them as quickly as a 4-digit PIN Which of the following about vulnerabilities and threats is *not* true? Correct Answer: A vulnerability or a threat, but not both, are required to create risk What does the concept of defense in depth mean? Correct Answer: Protect your data and systems with tools and techniques from different layers In the fake finger video from class, what was the printed circuit board used for? Correct Answer: to etch the fingerprint What is the difference between verification and authentication of an identity? Correct Answer: verification is a weaker confirmation of identity than authentication What do we call the rate at which we fail to authenticate legitimate users in a biometric system? Correct Answer: False Rejection Rate (FRR) [Show More]

Last updated: 2 years ago

Preview 1 out of 9 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Also available in bundle (1)

CYSE Tests Compilation Bundle

CYSE Tests Compilation Bundle

By Crum 2 years ago

$15.5

6  

Reviews( 0 )

$7.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

77
0

Document information


Connected school, study & course


About the document


Uploaded On

Oct 19, 2022

Number of pages

9

Written in

Seller


seller-icon
Crum

Member since 3 years

64 Documents Sold

Reviews Received
10
1
1
0
1
Additional information

This document has been written for:

Uploaded

Oct 19, 2022

Downloads

 0

Views

 77

Document Keyword Tags

Recommended For You

Get more on EXAM »

$7.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·