COMPLETE 200 QUESTIONS AND CORRECT DETAILED
ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+
What are factors of authentication? - ANSWER: something you have, something you
know, something you are
The security goal that seeks to ensure that only authorized people are given access
is: - ANSWER: confidentiality
_________ are technologies to report alarm conditions to key personnel or remote
monitoring organizations. - ANSWER: remote notification systems
_________ is a condition monitoring system that can record and signal each time a
specific gate or door is unlocked (access granted) and what type of access is granted.
- ANSWER: unlocked condition monitoring
_________ are technologies used to report alarm conditions to key personnel or
remote monitoring organizations. - ANSWER: remote notification systems
_________ is the science, technique, and art of establishing a system of exclusion
and inclusion for tangible assets. - ANSWER: physical security
Securing which of the following involves controlling who can move (walk, drive, fly)
across the physical or logical line that marks this perimeter, such as property lines or
the exterior walls of a building or complex? - ANSWER: the outer perimeter
Which lens enables you to view an entire room but with some distortion of the
image? - ANSWER: fish-eye lens
Using natural design elements such as structures and landscaping to guide people as
they enter and exit spaces is referred to as: - ANSWER: natural access control
Which of the following options represent physical barriers? - ANSWER: a locked
door, a receptionist
Which of the following is not a subsystem involved in infrastructure security
management? - ANSWER: corporate cybersecurity policies
_________ is a report that incorrectly authenticates the individual, which could
provide access to equipment or data that this person should not have. - ANSWER:
false acceptance
The security goal that seeks continuous operation is: - ANSWER: availability
, _________ is a type of image sensor used in cameras designed to produce the
highest quality images. - ANSWER: charged coupled device
_________ is a type of camera that provides the best resolution in low-light
conditions. - ANSWER: infrared
This technical access control identifies the basic properties or characteristics of an
entity with regard to safeguarding information so that control decisions can be
dynamic and automated. - ANSWER: security attributes
A mathematical process or series of structured steps for performing some function. -
ANSWER: algorithm
Mechanisms or protections against behavior that is outside an expected norm -
ANSWER: controls
Biometrics are examples of which authentication factor? - ANSWER: inherence
Trying all possible keys until finding the right key: - ANSWER: brute force attack
This form of cryptography uses the same key to encrypt as it does to decrypt: -
ANSWER: symmetric
Collecting intelligence information from people as part of human intelligence is
known as: - ANSWER: social engineering
A non-encrypted message is: - ANSWER: plaintext
The act of unscrambling ciphertext into plaintext: - ANSWER: decryption
A password, passphrase, or PIN are examples of which authentication factor? -
ANSWER: knowledge
Malware that makes multiple copies of itself on a single computer until it clogs the
system: - ANSWER: rabbit virus
Which of the following are software development techniques intended to reduce the
frequency and severity of vulnerabilities in software: - ANSWER: modularity,
information hiding, encapsulation
The part of your computer that is the environment architecture, which abstracts the
low-level interfaces to bare processing hardware or peripherals. It allows convenient
use and interfaces to the user and hides the tedious low-level stuff, to include
resource scheduling and allocation, memory management, deadlock avoidance, and
interfaces for low-level hardware: - ANSWER: operating system