Authentication and Authorisation of Information Security Context and Introduction
Week 3 Authentication and Authorisation of Information Security Context and Introduction
Question 1
Authentication always requires a password.
Question 2
We can consider a fingerprint as an authorisation system.
Question 3
Select, which of the following could prove your identity (individually, on their own) during an authentication process. (Note that this is a multiple-correct-answers question and the answer may include more than one option).
Week 4 ISO 27001 of Information Security Context and Introduction 1. Question 1 The ISO 27001 is: 1 point A standard that establishes the requirements for the implementation of an…
Week 3 of Networks of Information Security Context and Introduction 1. Question 1 Information being sent through a wired local network can be eavesdropped by: (multiple answers possible) 1…
Week 4 Incident Management of Information Security Context and Introduction 1. Question 1 Select the items from the list that are considered phases in the management of security incidents. 1…
Week 3 Access Control of Information Security Context and Introduction 1. Question 1 An access control policy establishes: 1 point The model of access for a specific system. A method…
Week 4 Risk Management of Information Security Context and Introduction 1. Question 1 Risk is defined as: 1 point The impact of a vulnerability that may affect the organization…
Week 3 Network Security Systems of Information Security Context and Introduction 1. Question 1 A firewall: 1 point Filters incoming and outgoing packets based on a set of rules. Detects…