100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Fundamentals of Cybersecurity Final Exam Questions And Actual Answers.

Rating
-
Sold
-
Pages
55
Grade
A+
Uploaded on
29-09-2024
Written in
2024/2025

We need to create a three-factor authentication system. The system already uses a USB device that is unlocked with the user's fingerprint. Which of the following can we add to implement three separate factors? A. A file of secret information stored on the user's authorized computers B. Signature recognition C. A process that requires the user's cell phone D. A PIN entered via a built-in PIN pad - Answer D. A PIN entered via a built-in PIN pad There are three types of tokens; which of the following is not a correct type? A. Offensive tokens B. One-time password tokens C. Challenge-response tokens D. Passive tokens - Answer A. Offensive tokens In practice, computer-based access control begins by making each process into its own: A. house.

Show more Read less
Institution
Cyber Security Fundamentals
Course
Cyber Security Fundamentals











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Security Fundamentals
Course
Cyber Security Fundamentals

Document information

Uploaded on
September 29, 2024
Number of pages
55
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Fundamentals of Cybersecurity Final
Exam Questions And Actual Answers.
We need to create a three-factor authentication system. The system already uses a USB device that is
unlocked with the user's fingerprint. Which of the following can we add to implement three separate
factors?



A. A file of secret information stored on the user's authorized computers



B. Signature recognition



C. A process that requires the user's cell phone



D. A PIN entered via a built-in PIN pad - Answer D. A PIN entered via a built-in PIN pad



There are three types of tokens; which of the following is not a correct type?



A. Offensive tokens



B. One-time password tokens



C. Challenge-response tokens



D. Passive tokens - Answer A. Offensive tokens



In practice, computer-based access control begins by making each process into its own:



A. house.

,B. island.



C. apartment.



D. planet. - Answer B. Island



____________ flaws in the software, such as finger service, are often exploited.



A. Windows



B. Shell shock



C. Buffer overflow



D. Blue screen of death - Answer C. Buffer Overflow



Most Microsoft Windows fatal errors (blue screen of death) are caused by:



A. hardware failure.



B. applications.



C. device drivers.



D. security violations. - Answer C. Device Drivers



Random access memory (RAM) access choices include which of the following? Multiple Choice

,A. read and write access.



B. no access.



C. write access only.



D. read access only. - Answer A. Read and Write Access, B. No Access, and D. Read Access Only



A type of security control that takes measures to help restore a system is referred to as:



A. detective.



B. preventative.



C. All of these are correct.



D. corrective. - Answer D. Corrective



On Unix-based systems, users type commands into a program to handle keyboard commands called a:



A. Typewriter.



B. CMD.



C. Shell.



D. Linux. - Answer C. Shell

, One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of
the finger service is to:



A. determine which ports are open on a computer.



B. report which device drivers a computer uses.



C. determine which operating system is running on a computer.



D. report the status of individual computer users. - Answer D. Report the Status of Individual Computer
Users



An example of _________ security control is when you unplug a computer from the internet to protect it
from malware.



A. mechanical



B. logical



C. physical



D. cryptographic - Answer A. Mechanical



True or False? A computer's basic input/output system (BIOS) is a computer program stored in read-only
memory (ROM). - Answer True



_________ is another name applied to IDE connections.



A. PCIe (Peripheral Component Interconnect Express)
R176,66
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Document also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TestSolver9 Webster University
Follow You need to be logged in order to follow users or courses
Sold
751
Member since
2 year
Number of followers
124
Documents
24581
Last sold
4 days ago
TESTSOLVER9 STORE

TOPNOTCH IN LEARNING MATERIALS,(EXAMS,STUDYGUIDES NOTES ,REVIEWS,FLASHCARDS ,ALL SOLVED AND PACKAGED.OUR STORE MAKE YOUR EDUCATION JOURNEY EFFICIENT AND EASY.WE ARE HERE FOR YOU FEEL FREE TO REACH US OUT .

3,6

130 reviews

5
58
4
19
3
22
2
9
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions