100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

INFORMATION SECURITY FINAL EXAM QUESTIONS AND ANSWERS 100% PASS

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
09-01-2026
Written in
2025/2026

INFORMATION SECURITY FINAL EXAM QUESTIONS AND ANSWERS 100% PASS

Institution
INFORMATION SECURITY
Course
INFORMATION SECURITY










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
INFORMATION SECURITY
Course
INFORMATION SECURITY

Document information

Uploaded on
January 9, 2026
Number of pages
16
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

INFORMATION SECURITY FINAL EXAM
QUESTIONS AND ANSWERS 100% PASS




Authorization - ANS After the succesful authentication, the authentication next step is:



username and password - ANS In authorization factors, something you know is:



keystroke dynamics - ANS In authentication factor, what do you do:



wireshark - ANS For sniffing of the credentials, the best software is:



Hash value - ANS Once the user enters his/her password, then the system converts the
password into



False - ANS Hash functions is extremely easy to reverse. True or false



Fixed and same - ANS Regardless the length of the password, the hash functions always
creates ______ size of hash



SAM File - ANS The password file stored on windows computer is termed as:



1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

,True - ANS Search space is the all possible passwords. True or false



True - ANS If we increase the length of the password, the size of the search space becomes
longer. True or false



Number of trials for 50% success rate - ANS The formula V=S/2L: here V denotes _______



False - ANS Bio-metrics and tokens are a good choice for a household environment. True or
false



False - ANS Credit and debit cards are examples of Active tokens. True or false



False - ANS Likelihood that the system may authenticate unauthorized people is: false
rejection rate. True or false



True - ANS In challenge response authentication, the user is provided with challenge (random
number) & the user uses his/her base code to find the response. True or false



False - ANS Offline attacks are easy to detect. True or false



False - ANS Shoulder surfing is not a problem at work. True or false



Passive - ANS _____ tokens store the credentials permanently in ROM & the credentials are
static



Hash Value - ANS Usually, the response of the challenge (send by Authentication system) is
_____ calculated with Base Secret

2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

, Track the failed password attempts - ANS To avoid strong risks, which should be the best
technique to detect the guessing attack:



Access Control System - ANS Grants or denies the access to specific equipment and
resources?



Logical - ANS _____access control control the access of computer, networks and
computational systems.



Security Kernel - ANS _____is a security system that enforced access control for
computational systems



True - ANS Security Kernel is usually a centralized system. True or false



Subjects - ANS In Access control systems, the users are known as:



Single sign on (SSO) - ANS Which access control is more suitable in Multi vendor
environment:



Discretionary Access Control (DAC) - ANS Which is the least restricted access control model:



Mandatory Access Control (MAC) - ANS Which is the most restricted access control model:



Rule Based Access Control (RBAC) - ANS Which is the best method for dynamic organizations,
where rules can be assigned to objects.




3 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Fyndlay Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
357
Member since
1 year
Number of followers
80
Documents
18668
Last sold
2 days ago
Scholar\'s Sanctuary.

Explore a Vast Collection of Finely Made Learning Materials.

3.7

68 reviews

5
32
4
8
3
13
2
6
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions