Answer the following Questions:   1) Which of the following is NOT…

Answer the following Questions:

 

1) Which of the following is NOT among the three types of authentication mechanisms?

 

something a person says

 

something a person has

 

something a person can produce

 

something a person knows

 

 

 

 

2) Encryption protects data in which of the following two (2) States of Data?

 

Data-at-Rest & Data-in-Use

 

Data-in-Motion & Data-in-Change

 

Data-in-Change & Data-in-Use

 

Data-in-Motion & Data-at-Rest

 

 

 

 

3) Which component of the time-based model of security does encryption affect most?

 

Correction

 

Response

 

Detection

 

Prevention

 

 

 

 

4) Which component of the time-based model of security does multi-factor authentication affect most?

 

Correction

 

Detection

 

Response

 

Prevention

 

 

 

5) The intermediate area between trusted and untrusted networks is referred to as which of the following?

 

semi-trusted area

 

demilitarized zone

 

proxy zone

 

unfiltered area

 

 

 

 

6) A best practice for passwords includes: using the maximum length allowed, applying the entire character set where permitted, have it be random, for a limited time that expires, keep it secret, and difficult to guess.

 

True

 

False

 

 

 

 

7) A firewall is device that prevents a specific type of information from moving between the untrusted network and the trusted network.

 

True

 

False

 

 

 

 

8) Which of the following is true about firewalls and their ability to adapt in a network?

 

Firewalls deal strictly with defined patterns of measured observation.

 

Firewalls are flexible and can adapt to new threats.

 

Because firewalls are not programmed like a computer, they are less error prone.

 

Firewalls can interpret human actions and make decisions outside their programming.

 

 

 

 

9) Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area?

 

authorization

 

authentication

 

detection

 

accountability

 

10) Technical controls alone, when properly configured, can secure an IT environment.

True

 

False

 

 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions