Top 20 Cyber Security Questions & Answers 4

Top 20 Cyber Security Questions & Answers

Data breaches and cyberattacks pose serious risks to individuals, companies, and governments in today’s increasingly digital environment, making cyber security an urgent issue. You must be well-informed and alert to succeed in this environment. From the fundamentals of internet safety to more complex topics like threat detection and incident response, this compilation of the top 20 cybersecurity questions and answers will cover it all. This guide is written with the goal of helping everyone, from novices to seasoned professionals in the subject of cybersecurity, take better care of their digital lives and possessions.

Now, let’s move on to the top 20 Cyber Security Questions & Answers

Q1. True or False? Passphrases are less secure than passwords.

Select one:
a. True
b. False

Q2. True or False? A Chinese wall security policy defines a barrier and develops a set of rules to ensure that no subject gets to objects on the other side.

Select one:
a. True
b. False

Q3. A company’s IT manager has advised the business’s executives to use a method of decentralized access control rather than centralized to avoid creating a single point of failure. She selects a common protocol that hashes passwords with a one-time challenge number to defeat eavesdropping-based replay attacks. What is this protocol?

a. Challenge-Handshake Authentication Protocol (CHAP)
b. Lightweight Directory Access Protocol (LDAP)
c. Kerberos
d. Password Authentication Protocol (PAP)

Q4. Anya is a cybersecurity engineer for a high-secrecy government installation. She is configuring biometric security that will either admit or deny entry using facial recognition software. Biometric devices have error rates and certain types of accuracy errors that are more easily tolerated depending on need. In this circumstance, which error rate is she likely to allow to be relatively high?

a. None
b. Crossover error rate (CER)
c. False acceptance rate (FAR)
d. False rejection rate (FRR)

Q5. True or False? Common methods used to identify a user to a system include username, smart card, and biometrics.

Select one:
a. True
b. False

Q6. Which type of authentication includes smart cards?

a. Knowledge
b. Ownership
C. Location
d. Action

Q7. True or False? Voice pattern biometrics are accurate for authentication because voices cannot easily be replicated by computer software.

Select one:
a. True
b. False

Q8. True or False? Log files are one way to prove accountability on a system or network.

Select one:
a. True
b. False

Q9. True or False? An authentication, authorization, and accounting (AAA) server, such as Remote Authentication Dial-In User Service (RADIUS), is a type of decentralized access control.

Select one:
a. True
b. False

Q10. True or False? Content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.

Select one:
a. True
b. False

Q11. True or False? A degausser creates a magnetic field that erases data from magnetic storage media.

Select one:
a. True
b. False

Q12. True or False? Temporal isolation is commonly used in combination with rule-based access control.

Select one:
a. True
b. False

Q13. True or False? A smart card is an example of a logical access control.

Select one:
a. True
b. False

Q14. True or False? Authentication by characteristics/biometrics is based on something you have, such as a smart card, a key, a badge, or either a synchronous or asynchronous token.

Select one:
a. True
b. False

Q15. True or False? The number of failed logon attempts that trigger an account action is called an audit logon event.

Select one:
a. True
b. False

Q16. Which of the following principles is not a component of the Biba integrity model?

a. Subjects cannot read objects that have a lower level of integrity than the subject.
b. Subjects cannot change objects that have a lower integrity level.
c. Subjects at a given integrity level can call up only subjects at the same integrity level or lower.
d. A subject may not ask for service from subjects that have a higher integrity level.

Q17. What is an example of two-factor authentication (2FA)?

a. Smart card and personal identification number (PIN)
b. PIN and password
c. Password and security questions
d. Token and smart card

Q18. True or False? Physically disabled users might have difficulty with biometric system accessibility, specifically with performance- based biometrics.

Select one:
a. True
b. False

Q19. True or False? Kerberos is an example of a biometric method.

Select one:
a. True
b. False

Q20. Which of the following is the point at which two error rates of a biometric system are equal and is the measure of the system’s accuracy expressed as a percentage?

a. False acceptance rate (FAR)
b. False rejection rate (FRR)
c. Crossover error rate (CER)
d. Reaction time

Answers

  1. b
  2. a
  3. a
  4. d
  5. a
  6. b
  7. b
  8. a
  9. b
  10. a
  11. a
  12. b
  13. b
  14. b
  15. b
  16. b
  17. a
  18. a
  19. b
  20. c