Question: Question 11 (2 points) How does iterating the HMAC (Hash-based Message Authentication Code) computation process help defend against attacks? Question 11 options: It makes the
Question 11 (2 points)
How does iterating the HMAC (Hash-based Message Authentication Code) computation process help defend against attacks?
Question 11 options:
|
|
It makes the HMAC output harder to reverse-engineer.
|
|
|
It makes the HMAC output more resistant to Rainbow table attacks.
|
|
|
It encrypts the message being authenticated.
|
|
|
It slows down password cracking attacks.
|
Question 12 (2 points)
The more iterations (HMAC) that are done, the less it takes to authenticate a user, but the more secure the algorithm will be.
Question 12 options:
| True | |
| False |
Question 13 (2 points)
A hacker was able to execute certain operations on your systems and modify the audit trail so that her actions were hidden. This compromises which important cybersecurity objective ?
(Refer to the CIA triad! Enter the full word without space)
Question 13 options:
Question 14 (3 points)
Link the example to the authentication scheme
Question 14 options:
|
|
Question 15 (3 points)
Match the definition to its corresponding hash function
Question 15 options:
|
|
Question 16 (4 points)
Map the definition to the corresponding concept of access control:
Question 16 options:
|
|
Question 17 (2 points)
An unauthorized employee modified the payroll system to give himself a raise, which cybersecurity mechanism would be most likely to address the threat ?
Question 17 options:
|
|
access control
|
|
|
encryption
|
|
|
audit logs
|
|
|
privacy
|
Question 18 (2 points)
A manager denied responsibility for the unauthorized access of another employee's computer, which cybersecurity mechanism would be most likely to address the threat ?
Question 18 options:
|
|
access control
|
|
|
encryption
|
|
|
audit logs
|
|
|
privacy
|
Question 19 (2 points)
Strong authentication refers to any form of authentication that goes beyond simply requiring a traditional password but instead relies on other passwordless authentication methods.
Question 19 options:
| True | |
| False |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
