Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CIS120B-21 Cybersecurity Fundamentals Part 2 – Final Exam Study Guide & Practice Questions

Beoordeling
-
Verkocht
-
Pagina's
36
Cijfer
A+
Geüpload op
20-02-2026
Geschreven in
2025/2026

CIS120B-21 Cybersecurity Fundamentals Part 2 – Final Exam Study Guide & Practice Questions

Instelling
CIS120B-21 Cybersecurity Fundamentals Part 2 – Fin
Vak
CIS120B-21 Cybersecurity Fundamentals Part 2 – Fin

Voorbeeld van de inhoud

CIS120B-21 Cybersecurity Fundamentals Part 2 – Final Exam Study
Guide & Practice Questions




What is Access Control? – Answer ✅️
✅The
️ process by which a system
determines who can use a resource and how



______ are implemented at the discretion of the data user. – Answer
✅️ ✅Discretionary
️ Access Controls (DACs)



______ are enforced by a central authority rather than by individual users. –
Answer ✅️ ✅Nondiscretionary
️ Access Controls (NDACs)



A form of mandatory access control that uses a matrix to specify user
permissions is called ______. – Answer ✅️
✅Lattice-based
️ access controls
(LBACs)



In ______, access privileges are determined by the specific roles users have
within an organization. – Answer ✅️ ✅Role-based
️ access controls (RBACs)



A ______ is a set of characters derived from a phrase to facilitate memory
recall for authentication purposes. – Answer ✅️ ✅virtual
️ password



______ involves assigning classifications to both information and users,
dictating their level of access. – Answer ✅️ ✅mandatory
️ access control (MAC)



______ determines user permissions based on user or system attributes. –
Answer ✅️ ✅attribute-based
️ access control (ABACs)

,The use of multiple methods of verification to establish user identity is
known as ______. – Answer ✅️✅strong
️ authentication



A series of characters known only to the user, serving as proof of identity for
system access, is called a ______. – Answer ✅️✅password




What does the False Reject Rate (FRR) measure in biometric access controls?



a. The time it takes to authenticate a user

b. The effectiveness of the biometric system

c. The rate at which authentic users are denied access

d. The rate at which unauthorized users are granted access – Answer ✅️
✅c.

The rate at which authentic users are denied access



The process of mapping a user’s real identity to a single digital identity used
across multiple systems is known as:



a. Lattice-based access control

b. Single sign-on (SSO)

c. Multifactor authentication

d. Role-based access control – Answer ✅️
✅b.
️Single sign-on (SSO)



True or False: Virtual Private Networks (VPNs) use encryption to secure data
transmitted over unsecured networks.



a. True

b. False – Answer ✅️
✅a.
️True

,What is the role of a proxy server in network security?



a. To intercept requests for information from external users

b. To increase network speed

c. To encrypt data packets

d. To distribute network traffic evenly – Answer ✅️
✅a.
️To intercept requests
for information from external users



Virtual Private Networks (VPNs) provide which of the following?



a. A firewall to prevent unauthorized access to a network

b. A method to increase internet speed

c. A private and secure connection over a public network

d. A way to bypass internet censorship without encryption – Answer ✅️
✅c.
️A
private and secure connection over a public network



A firewall that can dynamically adapt its rules to handle unexpected and
emergent network traffic is known as:



a. Unified Threat Management (UTM)

b. Dynamic packet filtering

c. Application layer proxy

d. Static packet filtering – Answer ✅️
✅b.
️Dynamic packet filtering



Which type of access control assigns users a matrix of authorizations for
particular areas of access?



a. Discretionary Access Controls (DACs)

, b. Role-Based Access Control (RBAC)

c. Lattice-Based Access Controls (LDACs)

d. Mandatory Access Control (MAC) – Answer ✅️
✅c.
️Lattice-Based Access
Controls (LDACs)



Which of the following is considered a ‘something you have’ authentication
factor?



a. A biometric fingerprint

b. A password

c. A smart card

d. A voice pattern – Answer ✅️
✅c.
️A smart card



Which firewall category operates at the Media Access Control sublayer of the
data link layer?



a. Stateful packet inspection (SPI) firewall

b. Packet-filtering firewall

c. Media access control layer firewall

d. Application layer proxy firewall – Answer ✅️
✅c.
️Media access control layer
firewall



Which type of access controls are implemented at the discretion of the data
user?



a. Nondiscretionary Access Controls (NDACs)

b. Discretionary Access Controls (DACs)

c. Lattice-Based Access Controls (LDACs)

Geschreven voor

Instelling
CIS120B-21 Cybersecurity Fundamentals Part 2 – Fin
Vak
CIS120B-21 Cybersecurity Fundamentals Part 2 – Fin

Documentinformatie

Geüpload op
20 februari 2026
Aantal pagina's
36
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$20.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EXAMCOLLECTIVES Herzing University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1775
Lid sinds
4 jaar
Aantal volgers
1159
Documenten
23369
Laatst verkocht
2 dagen geleden
Ace Your Exams with Elite Study Resources | ExamEliteHub on Stuvia

I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. These papers are invaluable resources made to help people who want to become nurses and people who work in other fields prepare for exams. Because of my extensive experience and in-depth knowledge of the subject, I take great care to ensure that each exam paper meets the highest quality, accuracy, and relevance standards, making them an essential component of any successful study plan.

Lees meer Lees minder
4.1

447 beoordelingen

5
252
4
57
3
84
2
19
1
35

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen