Module 5 Quiz - Security and Risk Management_ Information Security.Fall2019 - Module 5 Quiz Security and Risk Management Information

Module 5 Quiz - Security and Risk Management_ Information Security.Fall2019

This preview shows page 1 - 4 out of 19 pages.

11/24/2019 Module 5 Quiz - Security and Risk Management: Information Security.Fall2019 1/19 Module 5 Quiz - Security and Risk Management Due Nov 24 at 11:59pm Points 100 Questions 25 Available Nov 18 at 12am - Nov 24 at 11:59pm 7 days Time Limit 90 Minutes Instructions A±empt History Attempt Time Score LATEST Attempt 1 20 minutes 80 out of 100 Score for this quiz: 80 out of 100 Submitted Nov 24 at 2:12pm This attempt took 20 minutes. You may only take the quiz once. Find the detailed information in Module 5 Quiz instruction . Click the Take the Quiz button below to begin the quiz. 4 / 4 pts Question 1 Access control mechanisms include which of the following? Management, operational, and technical controls Logical, physical, and administrative controls Correct! Directive, preventive, and detective controls Corrective, recovery, and preventive controls
11/24/2019 Module 5 Quiz - Security and Risk Management: Information Security.Fall2019 2/19 Access control mechanisms include logical (passwords and encryption), physical (keys and tokens), and administrative (forms and procedures) controls. Directive, preventive, detective, corrective, and recovery controls are controls by action. Management, operational, and technical controls are controls by nature. 4 / 4 pts Question 2 Which of the following does not complement intrusion detection systems (IDS)? Vulnerability assessment tools Inference cells Correct! Correct! Honeypots Padded cells Honeypot systems, padded cell systems, and vulnerability assessment tools complement IDS to enhance an organization's ability to detect intrusion. Inference cells do not complement IDS. A honeypot system is a host computer that is designed to collect data on suspicious activity and has no authorized users other than security administrators and attackers. Inference cells lead to an inference attack when a user or intruder is able to deduce privileged information from known information. In padded cell systems, an attacker is seamlessly transferred to a special padded cell host. Vulnerability assessment tools determine when a network or host is vulnerable to known attacks.
11/24/2019 Module 5 Quiz - Security and Risk Management: Information Security.Fall2019 3/19 0 / 4 pts Question 3 In mobile device authentication, fingerprint authentication is an example of which of the following? Proof-of-origin Proof-by-property orrect Answer orrect Answer Proof-by-possession You Answered You Answered Proof-by-knowledge Proof-by-property is where a claimant authenticates his identity to a verifier by the use of a biometric sample such as fingerprints (i.e., something you are). Proof-by-possession and proof-by-knowledge, along with proof-by-property, are used in mobile device authentication and robust authentication. Proof-of-origin is the basis to prove an assertion. For example, a private signature key is used to generate digital signatures as a proof-of-origin.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture