Document Details

EasyToUseResilience

Uploaded by EasyToUseResilience

Nanyang Technological University

DR M Y Siyal

Tags

cyber security quiz biometrics cyber security computer science

Summary

This quiz covers topics in cyber security and biometrics. It includes multiple-choice questions about developing cyber security plans, policies, standards, guidelines, authentication factors, and fingerprint recognition. The questions focus on fundamental concepts.

Full Transcript

1. In developing a cyber security plan, what should a company/organization do first (particularly when they are in the initial planning stages)? a. It should buy state of the art technology b. It must first assess the current state of its security c. Both a and b...

1. In developing a cyber security plan, what should a company/organization do first (particularly when they are in the initial planning stages)? a. It should buy state of the art technology b. It must first assess the current state of its security c. Both a and b d. None of the above 2. Is top management support important in the success of cyber security project, when the project is being planned, implemented and executed? a. Yes, only at the initial stage b. Yes, throughout the project stages c. No d. None of the above 3. What must top management do to demonstrate support for cyber security project? a. Must ensure an adequate budget and follows security procedures themselves b. Send email to all staff and inform them that they are supporting the project c. Management cannot do anything as it is managed by technical staff d. None of the above DR M Y Siyal Q3-1 4. What are policies? a. Policies are statements about what should be done under specific circumstances b. Policies describe the actions that are taken to place the policy guidance into operation c. Both a and b d. None of the above 5. Why policies need to be acceptable to users? a. If policies are not acceptable (sensible) then users will bypass it, which is a dangerous trend b. So that users can modify it according to his/her needs c. Both a and b d. None of the above 6. Distinguish between standards and guidelines. a. Standards are mandatory while guidelines are discretionary b. Standards must be followed, while guidelines can be completely ignored c. Standard can be optional while guidelines are fixed d. None of the above DR M Y Siyal Q3-2 7. For guidelines, what is mandatory? a. It is mandatory for decision makers to carefully consider guidelines b. Nothing is mandatory for guidelines c. Since guidelines are must, everything is mandatory in guidelines d. None of the above 8. Which of the following is not an authentication factor? a. Something you have b. Something you know c. Something you see d. Something you are 9. ________ is the process of assessing the identity of each individual claiming to have permission to use a resource. a. Authorizations b. Authentication c. Availability d. None of the above DR M Y Siyal Q3-3 10. Short and simple reusable passwords are always easy for hackers to crack? a. Yes: As it can be cracked or guessed easily b. No: Regardless whether it is simple or complex, no password can be easily cracked c. It will still take very long time as no password is easy to crack d. None of the above 11. Using biometric technology can enhance customer trust? a. Yes: In fact, it does enhance customer trust and combat fraud b. No: Trust is not related to biometric based technology c. Trust can only be enhanced using complex system d. None of the above 12.What is the most common type of biometrics device in use today? a. Lie detectors that measure pulse rate b. Long and complex passwords b. Fingerprint scanners and readers c. Retinal scanners d. None of the above DR M Y Siyal Q3-4 13. A false acceptance occurs when a person is improperly matched to a template? a. Yes b. No 14. When an attacker deliberately attempts to fool the system, this is called ________. a. deception b. false acceptance c. false rejection d. None of the above 15. Which of the following statements accurately describes fingerprint recognition? a. Fingerprint recognition scanners are very expensive b. Fingerprint recognition is easily deceived c. Fingerprint recognition is rarely used d. None of the above DR M Y Siyal Q3-5

Use Quizgecko on...
Browser
Browser