Security Structure  «Prev  Next»

Security Elements - Quiz

Each question is worth one point. Select the best answer or answers for each question.
 
1. What is the means used to verify the identity of a user or system called? Please select the best answer.
  A. Access control
  B. Authentication
  C. Non-repudiation
  D. Identification

2. What is encryption strength is based on? Please select the best answer.
  A. The strength of the algorithm, the length of the key, and the secrecy of the key
  B. The privacy of the key, the length of the algorithm, and the strength of the key
  C. The length of the key, the type of algorithm, and the strength of the key
  D. The strength of the key, the length of the algorithm, and the privacy of the key

3. What should you do to determine the effectiveness of your security implementation? Please select all the correct answers.
  A. Implement intrusion detection
  B. Use activity logging
  C. Audit your systems regularly
  D. Use known encryption methods

4. What are the five primary security services? Please select the best answer.
  A. Data integrity, data security, authentication, repudiation, and verification
  B. Access control, data security, data verification, authentication, and non-repudiation
  C. Data confidentiality, non-repudiation, authentication, access control, and data identity
  D. Authentication, access control, data integrity, non-repudiation, and data confidentiality

5. Effective security includes the implementation of a training program to ensure that users Please select all the correct answers.
  A. Choose good passwords
  B. Set proper security on the systems they administer
  C. Remember their login name
  D. Understand the company’s security policy

6. What is the cryptographic method that proves an information exchange took place?
Please select the best answer.
  A. Authentication
  B. Data verification
  C. Non-repudiation
  D. Symmetric encryption

7. A specific mechanism used for data confidentiality is Please select the best answer.
  A. Encryption
  B. Authentication
  C. Algorithm
  D. Key

8. Authentication using fingerprints, visual identification based on a photograph, or signatures are examples of Please select the best answer.
  A. Physical authentication
  B. Password authentication
  C. Biometric authentication
  D. Secure authentication

9. What is a file containing users and groups associated with an object, and the rights that the user or group has when accessing that object called? Please select the best answer.
  A. A key
  B. An execution control list
  C. A dictionary program
  D. An access control list