100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cyber Security Exam Questions and Answers Latest 2025

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
30-01-2025
Written in
2024/2025

Cyber Security Exam Questions and Answers Latest 2025 Access Control - Answers controlling access to resources on a computer or network system. MAC - Answers Mandatory Access Control (MAC) models, the administrator manages access controls. The administrator defines a policy, which users cannot modify. For highest confidentiality. DAC - Answers Discretionary Access Control (DAC). A subject has complete control over the objects that it owns and the programs that it executes. Programs executed by a user will have the same permissions as the user who is executing it. RBAC - Answers In Role Based Access Control models, an administrator defines a series of roles and assigns them to subjects. Different roles can exist for system processes and ordinary users. Objects are set to be a certain type, to which subjects with a certain role have access. RB-RBAC - Answers Rule-Based Access Control. Dynamically assigns roles to subjects based on their attributes and a set of rules defined by a security policy. Identification - Answers Telling the system who you are Authentication - Answers Process of proving to a system that you are who you say you are. Something you know (i.e. a username and password). Something you have (i.e. a smartcard) Something you are (i.e. your finger print, hand writing, voice pattern) Multi-factor authentication = two or more authentication methods used in conjunction Password guessing/Brute-force attacks - Answers Password checker tries the password until it succeeds. Password aging - Answers As a password gets older there's an increased chance of it getting disclosed. Cognitive passwords - Answers Your mother's last name, 'matrix' or 'qwerty'. When a person or password checker tries to guess the password, it will typically start with common words. CHAP - Answers The Challenge Handshake Authentication Protocol (CHAP) is an authentication protocol that is primarily used for remote access PPP connections. Replaced the Plain Authentication Protocol (PAP). CHAP uses a more secure method, when a client wants to logon, the server sends a challenge request to the client, the client replies with a challenge response which is a hashed (one-way encrypted) value based on the username/password-combination and a random number. Vulnerable to brute force and dictionary attacks. Certificate - Answers An electronic document that typically contains a public key and personal user information. Offer better security against brute-force or dictionary attacks and password guessing than username/password-based authentication methods. Certification Authority (CA) - Answers Issues certificates to entities such as users, organizations, web sites and other CAs. As long as the CA can be considered a trustworthy authority, the certificates (and the key and entity combination in it) issued by it can be trusted as well. EAP-TLS (Enhanced Authentication Protocol - Transport Layer Security) - Answers A mutual authentication method, which means that both the client and the server prove their identities to each other. During the EAP-TLS authentication process, the remote access client sends its user certificate and the remote access server sends its computer certificate. Kerberos (Authentication) - Answers A fairly secure, but also complex and comprehensive, authentication system, default in Windows, version 5. There are three primary elements in a Kerberos system: Client, which is the Kerberos client application representing a principal (computer or user or software application). Target server, provides the service the client wants to access. Key Distribution Center (KDC), handles the distribution of keys and tickets. Kerberos Process - Answers Authentication Service (AS) Exchange - When the client logs on, the KDC issues a logon session key and a Ticket-Granting Ticket to the client, after the KDC has verified the client's encrypted user credentials. Ticket-Granting Service (TGS) Exchange - The client utilizes the TGT and the logon session key to request a new session key and ticket to be used between the client and the target server. Client-Server (CS) Exchange - The client sends the new ticket, including the new session key, to the target server to authenticate itself and to provide the target server with the session key. Optionally, the target server uses the new session key to authenticate itself to the client. Single Sign On (SSO) - Answers Allows a user to logon only once and be able to access all different resources in the network, such as e-mail, file servers, Intranet, etc. Attribute of Kerberos. Mutual authentication - Answers A client authenticates to a service, and the service authenticates to the client, before any application traffic is exchanged. Can be implemented using simple authentication protocols or more advanced solutions such as Kerberos, commonly found in SSL (Secure Socket Layer) connections. Biometrics - Answers Very secure type of authentication that uses anatomical and physiological characteristics to authenticate a user, "something you are." Requires a lot of storage, processing power, and appropriate conditions. Ex: Finger print, voice, palm, retina, iris, facial, etc. Tokens - Answers Software tokens are generated by the authenticating system when a user logs on successfully, provide access to resources. Hardware tokens, magnetic-strip cards and USB devices, contain a symmetric key that is used for one-way hashing of a pin code or time stamp. Smart Cards - Answers Contains information about who you are, likely in the form of a private key but can also store public keys, account numbers, passwords an

Show more Read less
Institution
Cyber Security
Course
Cyber Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Security
Course
Cyber Security

Document information

Uploaded on
January 30, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Cyber Security Exam Questions and Answers Latest 2025

Access Control - Answers controlling access to resources on a computer or network system.

MAC - Answers Mandatory Access Control (MAC) models, the administrator manages access controls.
The administrator defines a policy, which users cannot modify. For highest confidentiality.

DAC - Answers Discretionary Access Control (DAC). A subject has complete control over the objects that
it owns and the programs that it executes. Programs executed by a user will have the same permissions
as the user who is executing it.

RBAC - Answers In Role Based Access Control models, an administrator defines a series of roles and
assigns them to subjects. Different roles can exist for system processes and ordinary users. Objects are
set to be a certain type, to which subjects with a certain role have access.

RB-RBAC - Answers Rule-Based Access Control. Dynamically assigns roles to subjects based on their
attributes and a set of rules defined by a security policy.

Identification - Answers Telling the system who you are

Authentication - Answers Process of proving to a system that you are who you say you are.

Something you know (i.e. a username and password).

Something you have (i.e. a smartcard)

Something you are (i.e. your finger print, hand writing, voice pattern)

Multi-factor authentication = two or more authentication methods used in conjunction

Password guessing/Brute-force attacks - Answers Password checker tries the password until it succeeds.

Password aging - Answers As a password gets older there's an increased chance of it getting disclosed.

Cognitive passwords - Answers Your mother's last name, 'matrix' or 'qwerty'. When a person or
password checker tries to guess the password, it will typically start with common words.

CHAP - Answers The Challenge Handshake Authentication Protocol (CHAP) is an authentication protocol
that is primarily used for remote access PPP connections. Replaced the Plain Authentication Protocol
(PAP). CHAP uses a more secure method, when a client wants to logon, the server sends a challenge
request to the client, the client replies with a challenge response which is a hashed (one-way encrypted)
value based on the username/password-combination and a random number. Vulnerable to brute force
and dictionary attacks.

Certificate - Answers An electronic document that typically contains a public key and personal user
information. Offer better security against brute-force or dictionary attacks and password guessing than
username/password-based authentication methods.

, Certification Authority (CA) - Answers Issues certificates to entities such as users, organizations, web
sites and other CAs. As long as the CA can be considered a trustworthy authority, the certificates (and
the key and entity combination in it) issued by it can be trusted as well.

EAP-TLS (Enhanced Authentication Protocol - Transport Layer Security) - Answers A mutual
authentication method, which means that both the client and the server prove their identities to each
other. During the EAP-TLS authentication process, the remote access client sends its user certificate and
the remote access server sends its computer certificate.

Kerberos (Authentication) - Answers A fairly secure, but also complex and comprehensive,
authentication system, default in Windows, version 5.

There are three primary elements in a Kerberos system:

Client, which is the Kerberos client application representing a principal (computer or user or software
application).

Target server, provides the service the client wants to access.

Key Distribution Center (KDC), handles the distribution of keys and tickets.

Kerberos Process - Answers Authentication Service (AS) Exchange - When the client logs on, the KDC
issues a logon session key and a Ticket-Granting Ticket to the client, after the KDC has verified the
client's encrypted user credentials.

Ticket-Granting Service (TGS) Exchange - The client utilizes the TGT and the logon session key to request
a new session key and ticket to be used between the client and the target server.

Client-Server (CS) Exchange - The client sends the new ticket, including the new session key, to the
target server to authenticate itself and to provide the target server with the session key. Optionally, the
target server uses the new session key to authenticate itself to the client.

Single Sign On (SSO) - Answers Allows a user to logon only once and be able to access all different
resources in the network, such as e-mail, file servers, Intranet, etc. Attribute of Kerberos.

Mutual authentication - Answers A client authenticates to a service, and the service authenticates to the
client, before any application traffic is exchanged. Can be implemented using simple authentication
protocols or more advanced solutions such as Kerberos, commonly found in SSL (Secure Socket Layer)
connections.

Biometrics - Answers Very secure type of authentication that uses anatomical and physiological
characteristics to authenticate a user, "something you are." Requires a lot of storage, processing power,
and appropriate conditions.

Ex: Finger print, voice, palm, retina, iris, facial, etc.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
343
Member since
1 year
Number of followers
16
Documents
28821
Last sold
3 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions