Principles of Cybersecurity Final Study Set 2023 with complete solutions
True correct answersT/F: Identification is the means of establishing the validity of a claimed identity provided by a user. True correct answersT/F: An auditing function monitors and keeps a record of user accesses to system resources. identification correct answersAn authentication process consists of the ____ step and the verification step. System Integrity correct answers________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system cryptanalytic correct answersA ______ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. False correct answersT/F: A user program executes in a kernel mode in which certain areas of memory are protected from the user's use and certain instructions may not be executed. password cracker correct answersA __________ is a password guessing program. True correct answersT/F: In a biometric scheme some physical characteristic of the individual is mapped into a digital representation. True correct answersT/F: A user may belong to multiple groups. denial-of-service correct answersA ______ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.
École, étude et sujet
- Établissement
- Principles of Cybersecurity
- Cours
- Principles of Cybersecurity
Infos sur le Document
- Publié le
- 5 septembre 2023
- Nombre de pages
- 11
- Écrit en
- 2023/2024
- Type
- Examen
- Contient
- Questions et réponses
Sujets
-
principles of cybersecurity final study set
Document également disponible en groupe