Strategies for authenticating people on computer systems

Assignment Help Basic Computer Science
Reference no: EM133039369

1. Which of the following are the CIA properties? (Select the three correct properties.)

Authentication

Confidentiality

Integrity

Availability

Identity

Implementation

2. Which of the following is an example of a rule-based security decision?

Locking a car's ignition

Performing a step-by-step security analysis

Applying "security theater"

Trying to outdo a neighbor's security measures

3. We are estimating the impact of an individual attack. Which of the following has the greatest estimated impact?

An attack with a $100 loss that could happen once a week

An attack with a $400 loss that could happen once a month

An attack with a $2000 loss that could happen twice a year

An attack with a $5000 loss that could happen once a year

4. Risk Management Framework is a way to assess _______________ risks when developing large-scale computer systems.

5. What is a worm?

Malware

Sends spam

Blocks flow of computer traffic

Denial of service

6. True or False? Once we have filled in the attack likelihoods and impacts, we compute the significance by multiplying these values together.

True

False

7. An attempt by a threat agent to exploit assets without permission is referred to as

An attack

A vulnerability

A safeguard

A trade-off

8. The primary element on a computer motherboard that runs programs and makes the computer work is

Random access memory (RAM)

An input/output (I/O) circuit

The central processing unit (CPU)

Firmware

9. ____________ flaws in the software, such as finger service, are often exploited.

Buffer overflow

Blue screen of death

Shell shock

Windows

10. What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?

Gates

Jobs

Moore

Morris

11. True or False? Not all data is strictly numerical.

True

False

12. The __________ board contains slots or sockets for random access memory (RAM).

Mother

Father

Daughter

Son

13. True or False? A computer's basic input/output system (BIOS) is a computer program stored in read-only memory (ROM).

True

False

14. True or False? By the late 1980s, some virus writers were inclined toward destruction. The Jerusalem virus, which appeared in 1987 in the city of Jerusalem, contained a "destructive payload" that would delete all executable files on the system on Friday the 13th, starting in 1988.

True

False

15. The term _________ was used in operating systems research to describe the access rights a particular subject or process had for a particular object or resource.

Cluster

Permission

Capability

Objects

16. The "X" permission on the file indicates that the user has _________ right.

17. True or False? Every executable file begins with a "file header" that describes the structure and format of the program.

True

False

18. An interpreter is a program that interprets the text of a program in a symbolic form and performs the actions specified in the text. The following are examples of interpreters, except

C++

PHP

Javascript

Lisp

19. True or False? In a default permit, everything is allowed except sites on the prohibited list.

True

False

20. An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of

Single-factor authentication

Two-factor authentication

Three-factor authentication

None of these is correct

21. True or False? Authentication associates an individual with an identity.

True

False

22. True or False? Two-factor authentication is using two passwords.

True

False

23. True or False? Dictionary attacks differ from trial and error attacks because dictionary attacks focus on likely passwords.

True

False

24. The following are fundamental strategies for authenticating people on computer systems, except

Something you know

Something you have

Something you are

Something you make

25. We need to create a three-factor authentication system. The system already uses a USB device that is unlocked with the user's fingerprint. Which of the following can we add to implement three separate factors?

A file of secret information stored on the user's authorized computers

A PIN entered via a built-in PIN pad

Signature recognition

A process that requires the user's cell phone

Reference no: EM133039369

Questions Cloud

Different data warehouse system : Since there are different data warehouse system available such as AWS, Snowflake,...etc.
Digital forensics : Explain how cookies can show that a user has visited a site if that user's history has been deleted.
Creating visualizations : Discuss the key components of composition in data visualization. Note why the components are valuable when creating visualizations.
Compare different mobile platforms : Research and discuss effective use of screen real estate. Compare and contrast different mobile platforms (i.e. Android, iOS).
Strategies for authenticating people on computer systems : Which of the following is an example of a rule-based security decision? The following are fundamental strategies for authenticating people on computer systems
Potential advantages of distributed databases : What are the main reasons for an potential advantages of distributed databases?
Emerging technologies : What other major societal trends are forecasted that will continue to shift advertising dollars to new media, and why?
Design an infrastructure solution : Design an infrastructure solution using an external service provider. Describe a business scenario that requires a new or modified IT infrastructure.
Major malware containment vendor : Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Name basic constructs of ensemble model

Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?

  Advantages and disadvantages of periodic review systems

What are the three steps in designing process layouts? Describe advantages and disadvantages of periodic review systems.

  Internet of things as platform for intelligent application

Compare the IoT with regular Internet. Discuss the potential impact of autonomous vehicles on our lives. Why is the IoT considered a disruptive technology?

  Network plan you are investigating and researching

Make sure that for this network plan you are investigating, researching, and brainstorming stakeholder needs

  Differences exist between men and women in negotiation

What types of differences exist between men and women in negotiation?

  Administrator for a networking solutions firm

You are a senior network administrator for a networking solutions firm. Years ago, you installed a small local area network (LAN) at a design company.

  IFSM - OSI and Digital Convergence

Select three layers of the OSI model. Describe what the layers do, any specific protocols that are utilized in that layer, and why those layers are important.

  Show that a horizontal force having a magnitude op

The cylinder is subjected to a load that has a weight W. If the coefficients of rolling resistance for the cylinder's top and bottom surfaces are aA and bB

  Problem regarding the professional communications

One of the main topics for this week is professional communications. In the business world, this means email, technical writing, memos, and so on.

  Write a program in a programming language

Write a program in a programming language of your choice that simulates customers shopping and waiting in line at a grocery store.

  Explain the five steps of forecasting

Explain the five steps of forecasting, and then come up with an original example taken from your own professional experiences to illustrate these steps.

  Impact of big data on businesses

Find 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to Impact of Big Data on Businesses.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd