Which biometric authentication methods is frequently found

Assignment Help Computer Engineering
Reference no: EM131225403

1. Which of the following is most likely to be broken using a birthday attack?
a. DES
b. RSA
c. PKI
d. MD5

2. Which of following methods is best suited in a situation where bulk encryption is required?
a. RSA
b. ECC
c. DES
d. MD5

3. The main purposes for using cryptography include all but which one of the following?
a. Privacy
b. Authenticity
c. Integrity
d. Availability

4. Which of the following best describes the purpose of the key zeroization process?
a. To encrypt asymmetric data
b. To create an MD5 hash
c. To clear media of a key value
d. To encrypt symmetric data

5. Digital signatures are used for all but which one of the following purposes?
a. Authentication
b. Nonrepudiation
c. Integrity
d. Availability

6. All but which one of the following is security vulnerability found in RIP?
a. Broadcasts all data
b. No authentication
c. Travels only 56 hops
d. Subject to route poisoning

7. Which of the following statements is true in regard to TCP?
a. It makes a best effort at delivering information.
b. It guarantees delivery of information.
c. It does not establish session connection.
d. It is considered an OSI Layer 2 protocol

8. Which of the following is a factor that makes scanning UDP more difficult?
a. Low overhead
b. Lack of startup and shutdown
C. Speed
d. Packet structure

9. Which of the following is a common application layer attack?
a. Port scanning
b. Malware
c. Session hijack
d. SYN attack

10. Which of the following activities is the responsibility of the OSI reference model transport layer?
a. Physical layer connectivity
b. Delivery of IP packets
c. Formatting the data
d. Physical framing

11. Focal length defines which of the following camera qualities?
a. Degree of granularity
b. Ability to zoom
c. Scope of color
d. Horizontal and vertical view

12. A false acceptance rate is also known as which of the following errors?
a. Type A
b. Type B
c. Type 1
d. Type 2

13. If an active fax machine is discovered during an assessment, which of the following is of the least concern?
a. The phone number is publicly available.
b. The fax machine is in an open, unsecured area.
c. Faxes frequently sit in the printer tray.
d. The fax machine uses a ribbon.

14. Which of the following lock grades should be selected in order to appropriately protect critical business assets?
a. Grade 4
b. Grade 2
c. Grade 1
d. Grade 3

15. Which of the following biometric authentication methods is most frequently found on laptops?
a. Retina
b. Fingerprint
c. Iris
d. Voice recognition

16. Which of the following is a tool used for network mapping?
a. Superscan
b. Cheops
c. THC-Scan
d. Kismet

17. A ___________ scan detects packets in which all flags are active.
a. XMAS
b. FIN
c. ACK
d. SYN

18. Modems can be located by conducting what type of attack?
a. Wardialing
b. Wardriving
c. Pinging
d. Port scans

19. What does OS fingerprinting allow?
a. OS vulnerability testing
b. OS port scanning
c. Host OS identification
d. Packet capture

20. Which of the following is a tool used for wardriving?
a. Superscan
b. Cheops
c. THC-Scan
d. Kismet

21. Which of the following is a penetration testing framework?
a. TKIP
b. HIPAA
c. RFC 1087
d. NIST 800-53

22. Which of the following types of penetration testing is designed to attack an organization's physical security?
a. Social engineering attack
b. Stolen equipment attack
c. Outsider attack
d. Insider attack

23. Which of the following terms best describes hackers that occupy the lowest level of the hacker hierarchy?
Script kiddies

24. Which of the following statements is most accurate in regard to successful security professionals?
a. Once certified, they are current for as long as they practice
b. They must have at minimum a masters level college degree
c. They commit to lifelong learning
d. They only need to know general terms of technology

25. In which of the following phases does an attacker passively acquire information about the intended victim's systems?
a. Scanning
b. Enumeration
c. Footprinting
d. Escalation of privilege

26. Which of the following tools is used to determine the path to a specific IP address?
a. IANA
b. Nslookup
c. Whois
d. Traceroute

27. Which of the following databases would be valuable for obtaining information about a company's financial history?
a. Internet Assigned Numbers Authority (IANA)
b.Wayback Machine
c. EDGAR
d. Whois

28. In order to locate domain information on a Canadian organization, which of the following Regional Internet Registries would be checked first?
a. LACNIC
b. APNIC
c. RIPE
d. ARIN

29. Which of the following best describes the first two steps of the footprinting process?
a. Passive information gathering
b. Active information gathering
c. Actively mapping an organization's vulnerabilities
d. Using vulnerability scanners to map an organization

30. In order to locate domain information on a European organization, which of the following Regional Internet Registries would be checked first?
a. LACNIC
b. APNIC
c. RIPE
d. ARIN.

Reference no: EM131225403

Questions Cloud

What you think were the key actions taken by managers : Document what you think were the key actions taken by managers, and the key missed opportunities to take action.
Critically analyze astrazeneca''s expatriate management : According to the 2007 Expatriate Work/Life Balance Survey, 65% of expats report feeling the strain of managing the demands of work and home, leading to more anxieties at home and at the workplace. What steps can an organization take to mitigate this?
Determine the quiescent currents : Consider the current gain amplifier shown in given figure.  - Determine the quiescent currents IDQ1 and IDQ2. - Calculate the value of Ai.
Are you able to identify any personal misunderstandings : As you read the resources this week, what concepts seem especially relevant to you as a social worker? Are you able to identify any personal misunderstandings about the formation of gender identity? What strategies might you use to apply your new ..
Which biometric authentication methods is frequently found : Which of the following biometric authentication methods is most frequently found on laptops? Which of the following lock grades should be selected in order to appropriately protect critical business assets?
How sustainable is this source of advantage : Throughout this course, you will conduct a strategy audit for a selected company. Begin this assignment by selecting an organization for your course project activities.
How sociological environment influences physical health : Generate a chart that demonstrates how the sociological environment influences the physical and mental health of individuals. Include both the physical and social environment and write a synopsis of the influence created by each item on the chart...
Total compensation in existing markets : What are key human resources concerns and considerations related to compensation when an organization expands and moves into two or more geographical markets? Will total compensation in existing markets be affected by the organization's expansion ..
Estimate of the costs to prepare a bid for a contract : CSM80001 Project Costing - Final Assignment. The report will contain the following part: An estimate of the costs to prepare a bid for a contract of this type and value. The estimate is to be summarised in a table by department (rows) and work phas..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd