Principles of Cybersecurity Final Study Set 2023 with complete solutions
True correct answersT/F: Identification is the means of establishing the validity of a claimed identity provided by a user. True correct answersT/F: An auditing function monitors and keeps a record of user accesses to system resources. identification correct answersAn authentication process consists of the ____ step and the verification step. System Integrity correct answers________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system cryptanalytic correct answersA ______ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used. False correct answersT/F: A user program executes in a kernel mode in which certain areas of memory are protected from the user's use and certain instructions may not be executed. password cracker correct answersA __________ is a password guessing program. True correct answersT/F: In a biometric scheme some physical characteristic of the individual is mapped into a digital representation. True correct answersT/F: A user may belong to multiple groups. denial-of-service correct answersA ______ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.
Geschreven voor
- Instelling
- Principles of Cybersecurity
- Vak
- Principles of Cybersecurity
Documentinformatie
- Geüpload op
- 5 september 2023
- Aantal pagina's
- 11
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
principles of cybersecurity final study set
Ook beschikbaar in voordeelbundel