11/24/2019Module 5 Quiz - Security and Risk Management: Information Security.Fall20191/19Module 5 Quiz - Security and Risk ManagementDueNov 24 at 11:59pmPoints100Questions25AvailableNov 18 at 12am - Nov 24 at 11:59pm 7 daysTime Limit90 MinutesInstructionsA±empt HistoryAttemptTimeScoreLATESTAttempt 1 20 minutes80 out of 100Score for this quiz: 80out of 100Submitted Nov 24 at 2:12pmThis attempt took 20 minutes.You may only take the quiz once. Find the detailed information in Module 5 Quiz instruction. Clickthe Take the Quizbutton below to begin the quiz.4 / 4 ptsQuestion 1Access control mechanisms include which of the following?Management, operational, and technical controls Logical, physical, and administrative controls Correct!Directive, preventive, and detective controls Corrective, recovery, and preventive controls
11/24/2019Module 5 Quiz - Security and Risk Management: Information Security.Fall20192/19Access control mechanisms include logical (passwords andencryption), physical (keys and tokens), and administrative (forms andprocedures) controls. Directive, preventive, detective, corrective, andrecovery controls are controls by action. Management, operational,and technical controls are controls by nature.4 / 4 ptsQuestion 2Which of the following does not complement intrusion detection systems(IDS)?Vulnerability assessment tools Inference cells Correct!Correct!Honeypots Padded cells Honeypot systems, padded cell systems, and vulnerabilityassessment tools complement IDS to enhance an organization'sability to detect intrusion. Inference cells do not complement IDS. Ahoneypot system is a host computer that is designed to collect dataon suspicious activity and has no authorized users other than securityadministrators and attackers. Inference cells lead to an inferenceattack when a user or intruder is able to deduce privileged informationfrom known information. In padded cell systems, an attacker isseamlessly transferred to a special padded cell host. Vulnerabilityassessment tools determine when a network or host is vulnerable toknown attacks.
11/24/2019Module 5 Quiz - Security and Risk Management: Information Security.Fall20193/190 / 4 ptsQuestion 3In mobile device authentication, fingerprint authentication is an example ofwhich of the following?Proof-of-origin Proof-by-property orrect Answerorrect AnswerProof-by-possession You AnsweredYou AnsweredProof-by-knowledge Proof-by-property is where a claimant authenticates his identity to averifier by the use of a biometric sample such as fingerprints (i.e.,something you are). Proof-by-possession and proof-by-knowledge,along with proof-by-property, are used in mobile device authenticationand robust authentication. Proof-of-origin is the basis to prove anassertion. For example, a private signature key is used to generatedigital signatures as a proof-of-origin.