Answer the following Questions:
1) Which of the following is NOT among the three types of authentication mechanisms?
something a person says
something a person has
something a person can produce
something a person knows
2) Encryption protects data in which of the following two (2) States of Data?
Data-at-Rest & Data-in-Use
Data-in-Motion & Data-in-Change
Data-in-Change & Data-in-Use
Data-in-Motion & Data-at-Rest
3) Which component of the time-based model of security does encryption affect most?
Correction
Response
Detection
Prevention
4) Which component of the time-based model of security does multi-factor authentication affect most?
Correction
Detection
Response
Prevention
5) The intermediate area between trusted and untrusted networks is referred to as which of the following?
semi-trusted area
demilitarized zone
proxy zone
unfiltered area
6) A best practice for passwords includes: using the maximum length allowed, applying the entire character set where permitted, have it be random, for a limited time that expires, keep it secret, and difficult to guess.
True
False
7) A firewall is device that prevents a specific type of information from moving between the untrusted network and the trusted network.
True
False
8) Which of the following is true about firewalls and their ability to adapt in a network?
Firewalls deal strictly with defined patterns of measured observation.
Firewalls are flexible and can adapt to new threats.
Because firewalls are not programmed like a computer, they are less error prone.
Firewalls can interpret human actions and make decisions outside their programming.
9) Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area?
authorization
authentication
detection
accountability
10) Technical controls alone, when properly configured, can secure an IT environment.
True
False