We're Open
+44 7340 9595 39
+44 20 3239 6980

WHICH TERM IS USED WHEN SEPARATION OF PRIVILEGE IS APPLIED TO PEOPLE?

  100% Pass and No Plagiarism Guaranteed

WHICH TERM IS USED WHEN SEPARATION OF PRIVILEGE IS APPLIED TO PEOPLE?

Question 1                                                                                          Marked out of 1.00

 

Which term is used when separation of privilege is applied to people?

 

Select one:

 

  1. Nonrepudiation
  2. Security through obscurity
  3. Diversity of defense
  4. Separation of duties

 

Question 2                                                                                          Marked out of 1.00

 

Which statement describes why social engineering is successful?

 

Select one:

 

  1. People tend to forgo personal egos to better an organization.
  2. People have a basic desire to be helpful.
  3. People with a higher status may be coerced into providing information to those of lower status.
  4. People have a basic desire to withhold information for personal gain.

 

Question 3                                                                                          Marked out of 1.00

 

The principle of open design holds that the protection of an object should rely upon secrecy of the protection mechanism itself.

 

Select one:

 

  1. False
  2. True

 

Question 4                                                                                          Marked out of 1.00

 

Which password is weakest?

 

Select one:

 

  1. [email protected]$$w0rd
  2. H#e31L9pM3
  3. C#as%t*1ng
  4. [email protected]@!

 

Question 5                                                                                          Marked out of 1.00

 

Which attack is an example of an advanced persistent threat (APT) first reported by Google, but also targeting Adobe, Yahoo, Juniper Networks, Rackspace, Symantec, and several major U.S. financial and industrial firms?

 

Select one:

 

  1. Operation Aurora
  2. Conficker
  3. Stuxnet
  4. Operation Bot Roast

 

Question 6                                                                                          Marked out of 1.00

 

The entity that implements a chosen security policy and enforces those characteristics deemed most important by the system designers is known as the

 

Select one:

 

  1. CIA model
  2. Group policy
  3. Security model
  4. NIST Cyber Security Framework

 

Question 7                                                                                          Marked out of 1.00

 

Which security model uses transactions as the basis for its rules?

 

Select one:

 

  1. Simple Security
  2. Bell-LaPadula
  3. Biba
  4. Clark-Wilson

 

Question 8                                                                                          Marked out of 1.00

 

What is the first step an administrator can take to reduce possible attacks?

 

Select one:

 

  1. Install anti-spyware software.
  2. Ensure all patches for the operating system and applications are installed.
  3. Configure an intrusion detection system.
  4. Install a firewall.

 

Question 9                                                                                          Marked out of 1.00

 

What condition is described by the van Eck phenomenon and studied under TEMPEST?

 

Select one:

 

  1. Electromagnetic pulses destroying sensitive computer equipment
  2. Magnetic fields that interfere with signals crossing Local Area Network (LAN) cables
  3. Electromagnetic eavesdropping
  4. Piggybacking on electromagnetic communications

 

Question 10                                                                                        Marked out of 1.00

 

In 2014, on how many different threat actors, including criminals, hactivists, state-sponsored groups, and nation states, did CrowdStrike report?

 

Select one:

 

  1. 39
  2. 29
  3. 19
  4. 49

 

Question 11                                                                                        Marked out of 1.00

 

The biggest change affecting computer security that has occurred over the last 30 years has been the transformation of the computing environment from a highly interconnected network of smaller systems to large mainframes.

 

Select one:

 

  1. False
  2. True

 

Question 12                                                                                        Marked out of 1.00

 

Which statement accurately describes how pharming is accomplished?

 

Select one:

 

  1. The user is directed to a fake web site as a result of modification of local host files, which are used to convert URLs to the appropriate IP address.
  2. The attacker acts as a custodian and while watering the organization`s plants, he places cameras to record keystrokes.
  3. The attacker gathers prominent bits of information from the organization`s recycling/trash.
  4. The attacker attempts to engage the target in conversation and tries to evoke sympathy so that the target feels sorry for the individual and is more prone to provide information.

 

Question 13                                                                                        Marked out of 1.00

 

What type of authentication mechanism is a fingerprint?

 

Select one:

 

  1. Something you do
  2. Something you have
  3. Something you know
  4. Something about you

 

Question 14                                                                                        Marked out of 1.00

 

Which statement identifies a good first step for companies to take to fight potential social engineering attacks?

 

Select one:

 

  1. Buy the latest virus protection software and install on the systems.
  2. Establish policies and procedures dictating the roles and responsibilities all users, as well as security administrators.
  3. Conduct background checks on all contractors, consultants, delivery persons, and partners that may have access to the facilities.
  4. Monitor all phone calls and check logs on a daily basis.

 

Question 15                                                                                        Marked out of 1.00

 

In many early cases of computer crime, the perpetrator of the crime intended to cause damage to the computer.

 

Select one:

 

  1. False
  2. True

 

Question 16                                                                                        Marked out of 1.00

 

Which cell phone network component consists of antennas, receivers, transmitters, and amplifiers?

 

Select one:

 

  1. The base stations
  2. The wires carrying the signal
  3. The phones themselves
  4. The hardware and software that allows communication

 

Question 17                                                                                        Marked out of 1.00

 

What common password character combinations do users tend to use when creating passwords?

 

Select one:

 

  1. Numbers only
  2. All capital letters
  3. Passwords that are too long
  4. Names of family, pets, or teams

 

Question 18                                                                                        Marked out of 1.00

 

Which Internet criminal is famous for conducting his attacks using a number of different tools and techniques, including social engineering, sniffers, and cloned cellular telephones?

 

Select one:

 

  1. Kevin Mitnick
  2. Timothy Lloyd
  3. David Smith
  4. Robert Morris

 

Question 19                                                                                        Marked out of 1.00

 

Which statement describes an advantage of using biometrics for physical access control?

 

Select one:

 

  1. Biometrics are 100 percent effective.
  2. The individual always has the biometric in their possession.
  3. Hand geometry requires a fairly small device.
  4. Biometrics is a less sophisticated access control approach.

 

Question 20                                                                                        Marked out of 1.00

Which term describes communication that is designed so that devices can talk directly with each other without having to go through a central device?

 

Select one:

 

  1. Pass-thru communication
  2. Peer-to-peer communication
  3. Direct media communication
  4. Client-server communication

 

Question 21                                                                                        Marked out of 1.00

 

Which term refers to the mechanisms used to ensure that physical access to computer

systems and networks is restricted to authorized users?

 

Select one:

 

  1. Due diligence
  2. Physical security
  3. TEMPEST
  4. Intrusion detection system (IDS)

 

Question 22                                                                            Marked out of 1.00

 

TEMPEST is a program developed by the U.S. Department of Defense to protect equipment from the ill effects of weather and other natural disasters.

 

Select one:

 

  1. False
  2. True

 

Question 23                                                                                        Marked out of 1.00

 

For many years, the focus of security was on prevention.

 

Select one:

 

  1. False
  2. True

 

Question 24                                                                                        Marked out of 1.00

 

What is the most common authentication mechanism?

 

Select one:

 

  1. Magnetic card strip
  2. Signature
  3. Password
  4. Fingerprint

 

Question 25                                                                                        Marked out of 1.00

 

Biometrics suffer from false positives and false negatives, making them less than 100 percent effective.

 

Select one:

 

  1. False
  2. True

100% Plagiarism Free & Custom Written,
Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

STILL NOT CONVINCED?

View our samples written by our professional writers to let you comprehend how your work is going to look like. We have categorised this into 3 categories with a few different subject domains

View Our Samples

We offer a £ 2999

If your assignment is plagiarised, we will give you £ 2999 in compensation

Recent Updates

Details

  • Title: WHICH TERM IS USED WHEN SEPARATION OF PRIVILEGE IS APPLIED TO PEOPLE?
  • Price: £ 109
  • Post Date: 2018-11-09T08:40:00+00:00
  • Category: Assignment
  • No Plagiarism Guarantee
  • 100% Custom Written

Customer Reviews

WHICH TERM IS USED WHEN SEPARATION OF PRIVILEGE IS APPLIED TO PEOPLE? WHICH TERM IS USED WHEN SEPARATION OF PRIVILEGE IS APPLIED TO PEOPLE?
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I was worried about the plagiarism ration in my dissertation. But thanks to my dedicated writer, I received 0% plagiarism in all the chapters. I owe my writer a million thanks..!
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I have been taking help from Insta Research since 2015 and believe me, this place is incredible in giving the best help in assignments and essays. I also ask them to run plagiarism in my essays that I have written, and they always gave me accurate results. I am literally blessed to have a strong bonding with this site so that in any need of urgency, I contact them and find them always beside me. Thank you!