Professional Documents
Culture Documents
Assignment
Assignment
2- Which of the following services used to verify the identity of someone (user, device, or other
entity) who wants to use data, resources, or applications?
a) Confidentiality
b) Availability
c) Integrity
d) Authentication
3- For which of the following Threat Exposure an external authentication server like
TACKAC, RADIUS or KERBOUS may be implemented?
a) Low Threat Exposure
b) Medium Threat Exposure
c) High Threat Exposure
d) Medium and High Threats Exposure
e) None of them
4- Which of the following password attack, the attacker trying systematically entering
every password word prepared by the attacker based on the knowledge and
information of resources and its environment?
a) Eavesdropping Attack
b) Password stealing Attack
c) Brute force Attack
d) Dictionary Attack
e) None of them
B// [3 Marks] Answer with True or False?
1- According to guidelines for Access Control, you let access of operating system source
files, configuration files, and their directories to all users and authorized administrators
[ ].
2- The attacks like Denial of Service (DOS) can’t be avoided with the deployment of
Authentication [ ].
3- For high threat a choice could be made from something you have such as tokens, smart
cards and biometrics devices [ ].