Which biometric authentication methods is frequently found

Assignment Help Computer Engineering
Reference no: EM131225403

1. Which of the following is most likely to be broken using a birthday attack?
a. DES
b. RSA
c. PKI
d. MD5

2. Which of following methods is best suited in a situation where bulk encryption is required?
a. RSA
b. ECC
c. DES
d. MD5

3. The main purposes for using cryptography include all but which one of the following?
a. Privacy
b. Authenticity
c. Integrity
d. Availability

4. Which of the following best describes the purpose of the key zeroization process?
a. To encrypt asymmetric data
b. To create an MD5 hash
c. To clear media of a key value
d. To encrypt symmetric data

5. Digital signatures are used for all but which one of the following purposes?
a. Authentication
b. Nonrepudiation
c. Integrity
d. Availability

6. All but which one of the following is security vulnerability found in RIP?
a. Broadcasts all data
b. No authentication
c. Travels only 56 hops
d. Subject to route poisoning

7. Which of the following statements is true in regard to TCP?
a. It makes a best effort at delivering information.
b. It guarantees delivery of information.
c. It does not establish session connection.
d. It is considered an OSI Layer 2 protocol

8. Which of the following is a factor that makes scanning UDP more difficult?
a. Low overhead
b. Lack of startup and shutdown
C. Speed
d. Packet structure

9. Which of the following is a common application layer attack?
a. Port scanning
b. Malware
c. Session hijack
d. SYN attack

10. Which of the following activities is the responsibility of the OSI reference model transport layer?
a. Physical layer connectivity
b. Delivery of IP packets
c. Formatting the data
d. Physical framing

11. Focal length defines which of the following camera qualities?
a. Degree of granularity
b. Ability to zoom
c. Scope of color
d. Horizontal and vertical view

12. A false acceptance rate is also known as which of the following errors?
a. Type A
b. Type B
c. Type 1
d. Type 2

13. If an active fax machine is discovered during an assessment, which of the following is of the least concern?
a. The phone number is publicly available.
b. The fax machine is in an open, unsecured area.
c. Faxes frequently sit in the printer tray.
d. The fax machine uses a ribbon.

14. Which of the following lock grades should be selected in order to appropriately protect critical business assets?
a. Grade 4
b. Grade 2
c. Grade 1
d. Grade 3

15. Which of the following biometric authentication methods is most frequently found on laptops?
a. Retina
b. Fingerprint
c. Iris
d. Voice recognition

16. Which of the following is a tool used for network mapping?
a. Superscan
b. Cheops
c. THC-Scan
d. Kismet

17. A ___________ scan detects packets in which all flags are active.
a. XMAS
b. FIN
c. ACK
d. SYN

18. Modems can be located by conducting what type of attack?
a. Wardialing
b. Wardriving
c. Pinging
d. Port scans

19. What does OS fingerprinting allow?
a. OS vulnerability testing
b. OS port scanning
c. Host OS identification
d. Packet capture

20. Which of the following is a tool used for wardriving?
a. Superscan
b. Cheops
c. THC-Scan
d. Kismet

21. Which of the following is a penetration testing framework?
a. TKIP
b. HIPAA
c. RFC 1087
d. NIST 800-53

22. Which of the following types of penetration testing is designed to attack an organization's physical security?
a. Social engineering attack
b. Stolen equipment attack
c. Outsider attack
d. Insider attack

23. Which of the following terms best describes hackers that occupy the lowest level of the hacker hierarchy?
Script kiddies

24. Which of the following statements is most accurate in regard to successful security professionals?
a. Once certified, they are current for as long as they practice
b. They must have at minimum a masters level college degree
c. They commit to lifelong learning
d. They only need to know general terms of technology

25. In which of the following phases does an attacker passively acquire information about the intended victim's systems?
a. Scanning
b. Enumeration
c. Footprinting
d. Escalation of privilege

26. Which of the following tools is used to determine the path to a specific IP address?
a. IANA
b. Nslookup
c. Whois
d. Traceroute

27. Which of the following databases would be valuable for obtaining information about a company's financial history?
a. Internet Assigned Numbers Authority (IANA)
b.Wayback Machine
c. EDGAR
d. Whois

28. In order to locate domain information on a Canadian organization, which of the following Regional Internet Registries would be checked first?
a. LACNIC
b. APNIC
c. RIPE
d. ARIN

29. Which of the following best describes the first two steps of the footprinting process?
a. Passive information gathering
b. Active information gathering
c. Actively mapping an organization's vulnerabilities
d. Using vulnerability scanners to map an organization

30. In order to locate domain information on a European organization, which of the following Regional Internet Registries would be checked first?
a. LACNIC
b. APNIC
c. RIPE
d. ARIN.

Reference no: EM131225403

Questions Cloud

What you think were the key actions taken by managers : Document what you think were the key actions taken by managers, and the key missed opportunities to take action.
Critically analyze astrazeneca''s expatriate management : According to the 2007 Expatriate Work/Life Balance Survey, 65% of expats report feeling the strain of managing the demands of work and home, leading to more anxieties at home and at the workplace. What steps can an organization take to mitigate this?
Determine the quiescent currents : Consider the current gain amplifier shown in given figure.  - Determine the quiescent currents IDQ1 and IDQ2. - Calculate the value of Ai.
Are you able to identify any personal misunderstandings : As you read the resources this week, what concepts seem especially relevant to you as a social worker? Are you able to identify any personal misunderstandings about the formation of gender identity? What strategies might you use to apply your new ..
Which biometric authentication methods is frequently found : Which of the following biometric authentication methods is most frequently found on laptops? Which of the following lock grades should be selected in order to appropriately protect critical business assets?
How sustainable is this source of advantage : Throughout this course, you will conduct a strategy audit for a selected company. Begin this assignment by selecting an organization for your course project activities.
How sociological environment influences physical health : Generate a chart that demonstrates how the sociological environment influences the physical and mental health of individuals. Include both the physical and social environment and write a synopsis of the influence created by each item on the chart...
Total compensation in existing markets : What are key human resources concerns and considerations related to compensation when an organization expands and moves into two or more geographical markets? Will total compensation in existing markets be affected by the organization's expansion ..
Estimate of the costs to prepare a bid for a contract : CSM80001 Project Costing - Final Assignment. The report will contain the following part: An estimate of the costs to prepare a bid for a contract of this type and value. The estimate is to be summarised in a table by department (rows) and work phas..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define the use of databases and the benefits

define the use of databases in your organization. Include what database applications are used (Microsoft Access, DB2, Oracle, etc.). Conclude by proposing improvements.

  Integrated development environments ides are specialized

integrated development environments ides are specialized software packages that help programmers to write a program. in

  How to create an online account

A database would store the student's login name, class list, and number of registered credits. Furthermore, the database will store the administrator's login information and the classes listed in the online catalog. Add error handling to the appli..

  Write a 700 to 1050 word paper on a specific web or mobile

write a 700 to 1050 word paper on a specific web or mobile application.describe a specific web or mobile applications

  Consider the business impact of any situation

Consider the business impact of any situation

  What your relationship would be like with the technical

What instances of collaberation and communications do you and the technical staff explore.

  Why are most programs yet in cobol

Leibs, (2008) reported on a novel form of outsourcing software development. express the approach and share your thoughts about this new approach to software development.

  Relational database with microsoft access

Relational Database with Microsoft Access 2010.

  Design a class coord that includes the members

In ocean navigation, locations are measured in degrees and minutes of latitude and longitude. For in case, 149 degrees 34.8 minutes west longitude, and 17 degrees 31.5 minutes south latitude, to be written as 149°34.8' W, 17°31.5' S.

  Why would a system designer wish to make unicode

Why would a system designer wish to make Unicode the default character set for their new system? What reason(s) could you give for not using Unicode as a default?

  How to generate a class diagram for the entity classes

How to generate a class diagram for the entity classes

  Share two or three of the most valuable pieces of

your new software skills will not be of much use if you do not see a practical application for the skills in your

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd