100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ETH FINAL EXAM WITH 100% CORRECT ANSWERS 2024

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
01-07-2024
Written in
2023/2024

Nicola reports to the security guards that individuals are following closely when she enters buildings, using her credentials to gain access. She knows that some are valid employees but is concerned that not all the people are. What security breach is she reporting? correct answers Answer: Nicola is reporting a security breach related to tailgating or piggybacking. 2. Question As stated in your organization's new password policy, you must configure how many new passwords must be created before an old one can be reused. Which policy should you use? correct answers Answer: According to the new password policy, you must configure at least one new password to be created before an old one can be reused. 3. Question After installing a software firewall on his computer, a user reports that he is unable to connect to any Web sites. The user must be able to connect to all types of Web sites. Which ports should you open in the firewall application? correct answers Answer: You should open port 80 for HTTP and port 443 for HTTPS in the firewall application. 4. Question You are researching biometrics for identification and verification of employees in an organization. Which attributes or details of an employee can be used by biometric devices? correct answers Answer: Biometric devices can use attributes like fingerprint, iris pattern, facial features, voice, or hand geometry for identification and verification. 5. Question Which technology allows users to freely access all systems to which their account has been granted access after performing an initial authentication? correct answers Answer: Single Sign-On (SSO) technology allows users to access all systems to which their account has been granted access after performing an initial authentication. 6. Question When explaining the differences between NTFS and FAT32 to a user installing Window 7, which three benefits would you share with them regarding NTFS? correct answers Answer: The benefits of NTFS over FAT32 include support for larger file sizes, better file security through file permissions, and improved disk quotas. 7. Question You need to ensure that the data on storage media is properly classified to ensure that the appropriate data is retained. Which operation must you undertake to avoid mishandling of tapes, CD-ROMs, floppy disks, and printed material? correct answers Answer: You must undertake data classification to ensure that the appropriate data is retained and not mishandled.

Show more Read less
Institution
ETH 1
Course
ETH 1









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ETH 1
Course
ETH 1

Document information

Uploaded on
July 1, 2024
Number of pages
6
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

ETH FINAL FLASHCARDS
Nicola reports to the security guards that individuals are following closely when she enters buildings, using her credentials to gain access. She knows that some are valid employees but is concerned that not all the people are. What security breach is she reporting? correct answers Answer: Nicola is reporting a security breach related to tailgating or piggybacking.
2. Question
As stated in your organization's new password policy, you must configure how many new passwords must be created before an old one can be reused. Which policy should you use? correct answers Answer: According to the new password policy, you must configure at least one new password to be created before an old one can be reused.
3. Question
After installing a software firewall on his computer, a user reports that he is unable to connect to any Web sites. The user must be able to connect to all types of Web sites. Which ports should you open in the firewall application? correct answers Answer: You should open port 80 for HTTP and port 443 for HTTPS in the firewall application.
4. Question
You are researching biometrics for identification and verification of employees in an organization. Which attributes or details of an employee can be used by biometric devices? correct answers Answer: Biometric devices can use attributes like fingerprint, iris pattern, facial features, voice, or hand geometry for identification and verification.
5. Question
Which technology allows users to freely access all systems to which their account has been granted access after performing an initial authentication? correct answers Answer: Single Sign-On (SSO) technology allows users to access all systems to which their account has been granted access after performing an initial authentication.
6. Question
When explaining the differences between NTFS and FAT32 to a user installing Window 7, which three benefits would you share with them regarding NTFS? correct answers Answer: The benefits of NTFS over FAT32 include support for larger file sizes, better file security through file permissions, and improved disk quotas.
7. Question
You need to ensure that the data on storage media is properly classified to ensure that the appropriate data is retained. Which operation must you undertake to avoid mishandling of tapes, CD-ROMs, floppy disks, and printed material? correct answers Answer: You must undertake data classification to ensure that the appropriate data is retained and not mishandled. 8. Question
A hacker has called a company employee and learned the employee's user name and password by posing as a member of corporate technical support. Which type of attack has the company suffered? correct answers Answer: The company has suffered a social engineering attack, specifically a phishing attack.
9. Question
You want to provide secure access to the research laboratory and ensure that only authorized persons can enter the laboratory's server room. Which system does NOT provide an effective means of ensuring that only authorized persons can enter the server room? correct answers Answer: A regular lock and key system does not provide an effective means of ensuring that only authorized persons can enter the server room.
10. Question
Several users will be using a new Windows 7 computer. You have been asked to configure the accounts in the appropriate manner to maximize security. Which procedures should you implement? correct answers Answer: You should implement strong password policies, user account control, and regular software updates to maximize security on a new Windows 7 computer.
11. Question
You need to implement security measures for the mobile devices that have been issued
to company employees. Which security measure is considered to be the easiest to implement for mobile devices? correct answers Answer: Implementing device encryption is considered to be the easiest security measure to implement for mobile devices.
12. Question
You have recently implemented five different security solutions for a small business. Move the correct items from the left column to the column on the right to match the security solutions on the left with the security issue that the solution BEST addresses. correct answers Answer: (The options for this question were not provided in your message.)
13. Question
Your company has recently adopted several new security policies regarding mobile devices. Which mobile device application helps when a mobile device is stolen, but also
raises privacy concerns? correct answers Answer: The mobile device application that helps when a mobile device is stolen but raises privacy concerns is a remote wipe application.
14. Question
What is a smart card? correct answers Answer: A smart card is a physical card that contains an integrated circuit chip, which can store data securely and perform cryptographic operations.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
HopeJewels Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
70
Member since
1 year
Number of followers
10
Documents
8662
Last sold
4 days ago
macellen education agencies

On this page, you find all documents,testsbank ,solution manuals, package deals, On this page, you find all documents, package deals, and flashcards offered by seller Hopejewels

3.2

5 reviews

5
2
4
0
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions