ITC 564 Exam 1
Lighting at a facility should be directed toward fences and gates - Answer- true wireshark is an example of a keyboard logger - Answer- false a drop ceiling is a good choice for security - Answer- false what method permanently destroys the contents of magnetic media - Answer- degaussing the large red concrete balls in front of target are known as - Answer- bollards video monitoring of a building isn't needed if other layers of defense are present - Answer- false drives are not usually considered a security threat because of limited storage capability - Answer- false the best way to protect sensitive data on an external hard drive is through ______ - Answer- encryption what are examples of biometrics - Answer- voice recognition, iris recognition, keyboard dynamics "if you find a thumb drive, it is best to insert it so you can possibly find if it belongs to a hacker?" - Answer- false asymmetric encryption/decryption is a faster process than symetric - Answer- false a private key is used to decrypt data - Answer- true what else is encrypted data called - Answer- ciphertext hackers use ______ for fileless malware attacks - Answer- powershell encryption applies to which tenet of the C-I-A triad - Answer- C "If the actual message is the sixth word in each sentence, this is called a ___________ cipher" - Answer- concealment RSA is a hash algorithm - Answer- false SHA-1 is a highly preferred hash algorithm - Answer- false
École, étude et sujet
- Établissement
- ITC 564
- Cours
- ITC 564
Infos sur le Document
- Publié le
- 15 novembre 2023
- Nombre de pages
- 3
- Écrit en
- 2023/2024
- Type
- Examen
- Contient
- Questions et réponses
Sujets
- itc 564 exam 1
-
lighting at a facility should be directed toward f
-
wireshark is an example of a keyboard logger
-
a drop ceiling is a good choice for security