Which biometric authentication methods is frequently found

Assignment Help Computer Engineering
Reference no: EM131225403

1. Which of the following is most likely to be broken using a birthday attack?
a. DES
b. RSA
c. PKI
d. MD5

2. Which of following methods is best suited in a situation where bulk encryption is required?
a. RSA
b. ECC
c. DES
d. MD5

3. The main purposes for using cryptography include all but which one of the following?
a. Privacy
b. Authenticity
c. Integrity
d. Availability

4. Which of the following best describes the purpose of the key zeroization process?
a. To encrypt asymmetric data
b. To create an MD5 hash
c. To clear media of a key value
d. To encrypt symmetric data

5. Digital signatures are used for all but which one of the following purposes?
a. Authentication
b. Nonrepudiation
c. Integrity
d. Availability

6. All but which one of the following is security vulnerability found in RIP?
a. Broadcasts all data
b. No authentication
c. Travels only 56 hops
d. Subject to route poisoning

7. Which of the following statements is true in regard to TCP?
a. It makes a best effort at delivering information.
b. It guarantees delivery of information.
c. It does not establish session connection.
d. It is considered an OSI Layer 2 protocol

8. Which of the following is a factor that makes scanning UDP more difficult?
a. Low overhead
b. Lack of startup and shutdown
C. Speed
d. Packet structure

9. Which of the following is a common application layer attack?
a. Port scanning
b. Malware
c. Session hijack
d. SYN attack

10. Which of the following activities is the responsibility of the OSI reference model transport layer?
a. Physical layer connectivity
b. Delivery of IP packets
c. Formatting the data
d. Physical framing

11. Focal length defines which of the following camera qualities?
a. Degree of granularity
b. Ability to zoom
c. Scope of color
d. Horizontal and vertical view

12. A false acceptance rate is also known as which of the following errors?
a. Type A
b. Type B
c. Type 1
d. Type 2

13. If an active fax machine is discovered during an assessment, which of the following is of the least concern?
a. The phone number is publicly available.
b. The fax machine is in an open, unsecured area.
c. Faxes frequently sit in the printer tray.
d. The fax machine uses a ribbon.

14. Which of the following lock grades should be selected in order to appropriately protect critical business assets?
a. Grade 4
b. Grade 2
c. Grade 1
d. Grade 3

15. Which of the following biometric authentication methods is most frequently found on laptops?
a. Retina
b. Fingerprint
c. Iris
d. Voice recognition

16. Which of the following is a tool used for network mapping?
a. Superscan
b. Cheops
c. THC-Scan
d. Kismet

17. A ___________ scan detects packets in which all flags are active.
a. XMAS
b. FIN
c. ACK
d. SYN

18. Modems can be located by conducting what type of attack?
a. Wardialing
b. Wardriving
c. Pinging
d. Port scans

19. What does OS fingerprinting allow?
a. OS vulnerability testing
b. OS port scanning
c. Host OS identification
d. Packet capture

20. Which of the following is a tool used for wardriving?
a. Superscan
b. Cheops
c. THC-Scan
d. Kismet

21. Which of the following is a penetration testing framework?
a. TKIP
b. HIPAA
c. RFC 1087
d. NIST 800-53

22. Which of the following types of penetration testing is designed to attack an organization's physical security?
a. Social engineering attack
b. Stolen equipment attack
c. Outsider attack
d. Insider attack

23. Which of the following terms best describes hackers that occupy the lowest level of the hacker hierarchy?
Script kiddies

24. Which of the following statements is most accurate in regard to successful security professionals?
a. Once certified, they are current for as long as they practice
b. They must have at minimum a masters level college degree
c. They commit to lifelong learning
d. They only need to know general terms of technology

25. In which of the following phases does an attacker passively acquire information about the intended victim's systems?
a. Scanning
b. Enumeration
c. Footprinting
d. Escalation of privilege

26. Which of the following tools is used to determine the path to a specific IP address?
a. IANA
b. Nslookup
c. Whois
d. Traceroute

27. Which of the following databases would be valuable for obtaining information about a company's financial history?
a. Internet Assigned Numbers Authority (IANA)
b.Wayback Machine
c. EDGAR
d. Whois

28. In order to locate domain information on a Canadian organization, which of the following Regional Internet Registries would be checked first?
a. LACNIC
b. APNIC
c. RIPE
d. ARIN

29. Which of the following best describes the first two steps of the footprinting process?
a. Passive information gathering
b. Active information gathering
c. Actively mapping an organization's vulnerabilities
d. Using vulnerability scanners to map an organization

30. In order to locate domain information on a European organization, which of the following Regional Internet Registries would be checked first?
a. LACNIC
b. APNIC
c. RIPE
d. ARIN.

Reference no: EM131225403

Questions Cloud

What you think were the key actions taken by managers : Document what you think were the key actions taken by managers, and the key missed opportunities to take action.
Critically analyze astrazeneca''s expatriate management : According to the 2007 Expatriate Work/Life Balance Survey, 65% of expats report feeling the strain of managing the demands of work and home, leading to more anxieties at home and at the workplace. What steps can an organization take to mitigate this?
Determine the quiescent currents : Consider the current gain amplifier shown in given figure.  - Determine the quiescent currents IDQ1 and IDQ2. - Calculate the value of Ai.
Are you able to identify any personal misunderstandings : As you read the resources this week, what concepts seem especially relevant to you as a social worker? Are you able to identify any personal misunderstandings about the formation of gender identity? What strategies might you use to apply your new ..
Which biometric authentication methods is frequently found : Which of the following biometric authentication methods is most frequently found on laptops? Which of the following lock grades should be selected in order to appropriately protect critical business assets?
How sustainable is this source of advantage : Throughout this course, you will conduct a strategy audit for a selected company. Begin this assignment by selecting an organization for your course project activities.
How sociological environment influences physical health : Generate a chart that demonstrates how the sociological environment influences the physical and mental health of individuals. Include both the physical and social environment and write a synopsis of the influence created by each item on the chart...
Total compensation in existing markets : What are key human resources concerns and considerations related to compensation when an organization expands and moves into two or more geographical markets? Will total compensation in existing markets be affected by the organization's expansion ..
Estimate of the costs to prepare a bid for a contract : CSM80001 Project Costing - Final Assignment. The report will contain the following part: An estimate of the costs to prepare a bid for a contract of this type and value. The estimate is to be summarised in a table by department (rows) and work phas..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Identify and analyze at least four digital payment concerns

with the increasing use of digital payments and the decreasing use of cash payments enhanced digital security and

  How to generate the computer code

I have not seen them yet, but the wave appears to be toward a complete English ability to write down computer programs.

  The solution is about the kinds of ai systems

The solution is about the types of AI systems that could be used to help make systems more efficient. It also explains how they would help.

  Compare and contrast monitoring of patient vital signs by

mobile computing has dramatically changed how information is accessed and shared. wireless networking has been an

  Define use of service-oriented architecture and why

Giving reasons for your answer, suggest two types of applications where you would not recommend the use of service-oriented architecture and why.

  Configuring x-lite softphones

Configuring Phone Extensions on the Elastix Server, Configuring X-lite Softphones

  Describe how you would develop an addressing and naming

discuss how you would develop an addressing and naming model in an environment that has 10 departments in a 1000

  What connection can you make to previous learning experience

From what you know about this course so far, what connections can you make to previous learning experiences, and how do you think this course will help you as you move forward in your college and professional life?

  Define what a distributed database is

In this discussion board, you would investigate distributed databases and partitioning. You have been asked to prepare an informative memo that will address the following.

  Should more programmers be assigned to the project why

If the project manager feels that programming is falling behind schedule, should more programmers be assigned to the project? Why or why not?

  Issues or problems related to database architecture

In a Microsoft Word document, write an 800- to 1,000-word research paper. Your research paper should contain the following sections.

  Choose one of the network tools found in a windows 2000

Select one of the network tools found in a Windows 2000 server. Look up use of this tool. Using a creative writing narrative format write a short story explaining how you will use this tool to keep the network running successfully.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd