Podcast
Questions and Answers
Which of the following is a factor that determines access to various systems?
Which of the following is a factor that determines access to various systems?
- Internet usage
- Verify how often users change their passwords
- Software license
- Audit passwords (correct)
What might a log include?
What might a log include?
- Records of hardware failures
- Records of user logins or logouts
- Records of resource accesses (correct)
- Records of software errors
What is the process of transforming readable data into an unreadable form called?
What is the process of transforming readable data into an unreadable form called?
- Decryption
- Substitution
- Cryptography
- Encryption (correct)
What type of encryption substitutes each letter in the alphabet with a different one?
What type of encryption substitutes each letter in the alphabet with a different one?
What is the purpose of vulnerability assessments?
What is the purpose of vulnerability assessments?
What is the name of the mechanical cryptographic machine invented by Thomas Jefferson in 1795?
What is the name of the mechanical cryptographic machine invented by Thomas Jefferson in 1795?
What are vulnerability scanning tools used for?
What are vulnerability scanning tools used for?
What is the purpose of configuring logging mechanisms in a system?
What is the purpose of configuring logging mechanisms in a system?
What is the more recent variation of the Caesar cipher that moves each letter 13 places forward in the alphabet?
What is the more recent variation of the Caesar cipher that moves each letter 13 places forward in the alphabet?
What type of encryption substitutes each letter in the alphabet with a different one?
What type of encryption substitutes each letter in the alphabet with a different one?
Which of the following is a key step in the process of allowing parties to access resources?
Which of the following is a key step in the process of allowing parties to access resources?
What are the two commonly used access control methods?
What are the two commonly used access control methods?
What is the purpose of nonrepudiation?
What is the purpose of nonrepudiation?
How can accountability act as a deterrent against misbehavior?
How can accountability act as a deterrent against misbehavior?
What can auditing information in an environment help detect and prevent?
What can auditing information in an environment help detect and prevent?
Which of the following is NOT a commonly used access control method?
Which of the following is NOT a commonly used access control method?
What is the purpose of intrusion detection and prevention?
What is the purpose of intrusion detection and prevention?
What is the consequence of not keeping track of how people access sensitive data?
What is the consequence of not keeping track of how people access sensitive data?
What is the purpose of encryption technologies in establishing nonrepudiation?
What is the purpose of encryption technologies in establishing nonrepudiation?
What is the key to deterrence against misbehavior in security environments?
What is the key to deterrence against misbehavior in security environments?