Cybersecurity Management I - Strategic - C727 UCer
Cybersecurity Management I - Strategic - C727 UCer
Exam (elaborations)
Cybersecurity Management I - Strategic - C727 UCertify Practice Test (B) with complete solution latest update
7 views 0 purchase
Course
Cybersecurity Management I - Strategic - C727 UCer
Institution
Cybersecurity Management I - Strategic - C727 UCer
Cybersecurity Management I - Strategic - C727 UCertify Practice Test (B) with complete solution latest update
Question 1 :To which type of attack are wireless networks particularly susceptible?
emanations capturing
___________backdoors in applications that are designed by the application devel...
cybersecurity management i strategic c727 ucertify practice test b with complete solution latest update question 1 to which type of attack are wireless networks particularly susceptible emana
Written for
Cybersecurity Management I - Strategic - C727 UCer
All documents for this subject (6)
Seller
Follow
ACADEMICAIDSTORE
Reviews received
Content preview
Cybersecurity Management I - Strategic - C727 UCertify
Practice Test (B) with complete solution latest update
Question 1 :To which type of attack are wireless networks particularly
susceptible?
emanations capturing
___________backdoors in applications that are designed by the application
developers to perform maintenance tasks. It enables code to be executed without
the usual security checks.
Maintenance hooks are
___________ occurs when too much data is transmitted to an application or
operating system.
A buffer overflow
__________, or a time-of-check/time-of-use (TOC/TOU) attack, happens when an
attacker interrupts a task and changes something to direct the result.
An asynchronous attack
Question 2 :What is TEMPEST?
D
a United States government program that reduces electronic equipment emanations
Question 3 :Security personnel have report that your organization's fingerprint
biometric system is granting access to unauthorized users. What is the most
appropriate reason for this occurrence?
The biometric system has high type 2 error rate and allows the authentication of
unauthorized users.
__________implies that unauthorized people are being falsely authenticated by
the biometric system and that intruders could access critical resources.
A high type 2 error valid
Your organization has deployed a hand geometry scan biometric system that will
control access to the data processing center. Which characteristic are NOT
evaluated by this biometric system?
Each correct answer represents a complete solution. Choose all that apply.
ridge endings
skin tone of the hand
Question 5 :A military research institution is planning to implement a biometric
system to ensure complete privacy and confidentiality within the institution. Four
different vendors have given the specifications of their biometric systems.
Considering the following specifications, which option is recommended for the
institution?
Vendor A: Type 1 errors 80%, Type 2 errors 1 %, CER 4%
___________ is the most critical measurement to measure the accuracy of the
system. A CER value of 5 is better than a CER value of 10. For example, a voice
pattern-based biometric system has the highest CER value.
The CER rating for a biometric system
, ____________ implies that many valid authentication attempts are being rejected,
and the employees' productivity could be negatively affected, causing less user
acceptance
A high value of type 1 error
Question 6 :You need to improve the user accountability for your company's
network. Which feature(s) will provide this?
Each correct answer represents a complete solution. Choose all that apply.
access control lists (ACLs)
audit logs
Question 7 :You need to determine which users are accessing a Windows Server
2008 computer from the network. Which audit category should you enable?
Audit Privilege Use
Question 8 :Your company has several UNIX servers on its network. These
servers were configured before your employment in the company and prior to the
company establishing a server security policy. You are concerned about the root
account on these UNIX servers. Which security guidelines should you follow?
Only allow root login via the local console.
Limit administrator access to the root account.
Question 9 :You discover that a computer in your network has been infected by
the C2MyAzz application. What is an effect of this attack?
It captures user passwords as they are entered.
Question 10 :You are implementing new password policies on your company's
network. You need to ensure that users must use 20 new passwords before
reusing an old one. Which password policy setting should you implement?
password history
Question 11 :Your organization uses the Kerberos protocol to authenticate users
on the network. Which statement is true of the Key Distribution Center (KDC)
when this protocol is used?
The KEY DISTRIBUTION CENTER KDC is used to store, distribute, and maintain
cryptographic session keys.
Question 12 :Which statement is NOT true of cross certification?
Cross certification checks the authenticity of the certificates in the certification path.
The primary purpose of __________ is to build a trust relationship between
different certification hierarchies when users belonging to different hierarchies
are required to communicate and might require authentication for legitimate
connections
cross certification
Question 13 :Your company currently deploys Kerberos to provide authentication
for all users on the network. Management has recently heard of security
weaknesses in the Kerberos protocol. They have asked you to implement an
authentication protocol that addresses the weaknesses in Kerberos. Which
protocol should you deploy?
SESAME
Unlike Kerberos, __________uses both symmetric and asymmetric encryption to
protect data exchange and to authenticate subjects. SESAME uses a trusted
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.