PREVIOUS QUESTION & ANSWER

Q :
A :

 ·         Question 1

5 out of 5 points

   

Correct

Social security numbers make good authenticators because:

     

Selected Answer:

Correct 

Social security numbers do not make good authenticators

Answers:

Everyone has one



 

You can use them to keep out illegal aliens



 

There are no laws restricting their use



 

Correct 

Social security numbers do not make good authenticators

     

·         Question 2

5 out of 5 points

   

Correct

How can integrity suffer when outsourcing operations to a cloud provider?

     

Selected Answer:

Correct 

Lack of control over building images used for VMs

Answers:

Cloud authentication is weak

 

Correct 

Lack of control over building images used for VMs

 

Distributed computing allows more attacks

 

SLAs are hard to enforce

     

·         Question 3

5 out of 5 points

   

Correct

Cloud tenants are completely isolated from one another and cannot intrude into another tenant’s data.

     

Selected Answer:

Correct

False

Answers:

True

 

Correct

False

     

·         Question 4

5 out of 5 points

   

Correct

Which aspect of account management is the most difficult?

     

Selected Answer:

Correct 

Authentication

Answers:

Validating initial information

 

Identification

 

Correct 

Authentication

 

Authorization

     

·         Question 5

5 out of 5 points

   

Correct

Forcing people to use their real names on web sites will solve problems of bad behavior.

     

Selected Answer:

Correct

False

Answers:

True

 

Correct

False

     

·         Question 6

5 out of 5 points

   

Correct

How should you store passwords?

     

Selected Answer:

Correct 

Salted and hashed

Answers:

In plaintext so you can get it back to people if they forget it

 

Using the system storepassword() function



 

Correct 

Salted and hashed

 

Salted and peppered

     

·         Question 7

5 out of 5 points

   

Correct

Accounts must always map to a person.

     

Selected Answer:

Correct

False

Answers:

True

 

Correct

False

     

·         Question 8

5 out of 5 points

   

Correct

Which component for web site diagrams can provide the best indicator for threat sources?

     

Selected Answer:

Correct 

Dependencies

Answers:

Correct 

Dependencies

 

Lanes

 

Root cause

 

Data ownership

     

·         Question 9

5 out of 5 points

   

Correct

What are the problems with “secret questions” for authentication? (select all that apply)

     

Selected Answers:

Correct 

The same questions are used at many sites

 

Correct 

The answers have little entropy

 

Correct 

The answers are hard to remember

 

Correct 

Public records

 

Correct 

Repeatability

 

Correct 

Storage

 

Correct 

Privacy

Answers:

Correct 

The same questions are used at many sites



 

Correct 

The answers have little entropy



 

Correct 

The answers are hard to remember



 

Correct 

Public records



 

Correct 

Repeatability



 

Correct 

Storage



 

Correct 

Privacy



     

·         Question 10

5 out of 5 points

   

Correct

In the “something you have, something you are, something you know” model, which is a password?

     

Selected Answer:

Correct 

something you know

Answers:

something you have

 

something you are

 

Correct 

something you know

     

 


Related Questions & Answer

Get Your Solution Free




Get Your Solution Paid




DEMO