Security Roundtable Quiz-3

  • ISO/IEC 27001
  • NIST SP 800-53
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Advaiya
A
Advaiya
Community Contributor
Quizzes Created: 1 | Total Attempts: 436
| Attempts: 436 | Questions: 11
Please wait...
Question 1 / 11
0 %
0/100
Score 0/100
1. Granting of access privileges to certain files is:

Explanation

Answer c:
Be careful not to confuse authentication with authorization.
Authentication is the process of verifying the identity of the sender and/or
receiver of information. Authorization establishes what the user is allowed
to do once the user has been identified and authenticated by the system.
Another “A” term sometimes misinterpreted is accountability, which is the
ability to track actions to users.

Submit
Please wait...
About This Quiz
Security Roundtable Quiz-3 - Quiz

Security Roundtable Quiz-3 covers topics like internal intruders, attack methods, virus characteristics, system access controls, and biometric systems.

Personalize your quiz and earn a certificate with your name on it!
2. Audit logs should record all of the following EXCEPT:

Explanation

Answer b:
The audit data will reveal that a specific user accessed the file,
the time of access, and the type of access.

Submit
3. Requiring approval before granting system access would be:

Explanation

Answer d:
Administrative controls consist of management activities such
as organizational policies and procedures.

Submit
4. Audit logs should be protected for all of the reasons EXCEPT:

Explanation

Answer d:
The audit trail data should be protected at the most sensitive system level.

Submit
5. How might an attacker with little systems experience gain privileged systems access?

Explanation

Answer d: Shoulder-surfing
, the process of direct visual observation of monitor
displays to obtain access to sensitive information.

Submit
6. What is a security benefit related to thin-client architecture?

Explanation

Answer b:
Access controls can be centrally located on the server.

Submit
7. Which of the following is NOT a characteristic of a virus?

Explanation

Answer a:
Worms usually do not cause damage to data; instead, the worm
absorbs the network’s resources causing the damage.

Submit
8. Important elements in choosing a biometric system include all of the following EXCEPT:

Explanation

Answer c:
Important elements of biometric devices are accuracy, processing
speed, and user acceptability.

Submit
9. Internal intruders are NOT usually defined as:

Explanation

Answer b:
Authorized users trying to gain access to data or resources
beyond their need-to-know or access limitations. Authorized users trying
to gain unauthorized physical access to network connections, server
equipment, etc.

Submit
10. What is the best method of reducing a brute-force denial-of-service attack against a password file?

Explanation

Answer b:
Denial-of-service attack, whereby the perpetrator is able to lock out many users by discovering their user identifications and entering a specified number of invalid passwords, is minimized.
Note that answer A could also be correct but is not the best answer from a security perspective.

Submit
11. Which of the following is NOT a common attack performed against smart cards?

Explanation

Answer a:
There are several weaknesses and types of attacks against smart cards, including answers b, c, and d.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 12, 2009
    Quiz Created by
    Advaiya
Cancel
  • All
    All (11)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Granting of access privileges to certain files is:
Audit logs should record all of the following EXCEPT:
Requiring approval before granting system access would be:
Audit logs should be protected for all of the reasons EXCEPT:
How might an attacker with little systems experience gain privileged...
What is a security benefit related to thin-client architecture?
Which of the following is NOT a characteristic of a virus?
Important elements in choosing a biometric system include all of the...
Internal intruders are NOT usually defined as:
What is the best method of reducing a brute-force denial-of-service...
Which of the following is NOT a common attack performed against smart...
Alert!

Advertisement