Security Roundtable Quiz-3 covers topics like internal intruders, attack methods, virus characteristics, system access controls, and biometric systems.
Successful access attempts
System performance measurements
Failed access attempts
Changes to user permissions
Rate this question:
A physical control
A logical control
A compensating control
An administrative control
Rate this question:
Modification may impede an investigation
An attacker may try to alter them.
They may contain confidential information.
Standard format is critical for automated processing.
Rate this question:
Dictionary attack
Brute-force attack
Birthday attack
Shoulder-surfing attack
Rate this question:
Reduced total cost of ownership of desktops
Standardized access control
Easier training for users
Wider availability of applications
Rate this question:
Its primary effect is to consume system resources.
It may or may not carry a malicious payload.
It spreads through user action.
It attaches itself to executable code.
Rate this question:
User acceptance
Accuracy
Productivity
Processing speed
Rate this question:
Authorized users exceeding their authority
Persons who have defeated the physical access controls of a facility
Employees gaining access to controlled areas
Users who access unintended areas of the network
Rate this question:
Setting a higher clipping level
Locking out a user for a set time period
Establishing a lockout that requires administrator intervention
Using a stronger cryptographic algorithm
Rate this question:
Etching
Microprobing
Fault generation
Eavesdropping
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.