Problem 1
For Exercises 1-27, mark the answers true or false as follows: A. True B. False Information integrity ensures that data can be modified only by appropriate mechanisms.
Problem 2
For Exercises 1-27, mark the answers true or false as follows: A. True B. False Pairing threats with vulnerabilities is a part of risk analysis.
Problem 4
For Exercises 1-27, mark the answers true or false as follows: A. True B. False Biometrics is a type of user authentication that relies on the user having a smart card or a card with a readable magnetic strip.
Problem 5
For Exercises 1-27, mark the answers true or false as follows: A. True B. False A password should not resemble anything that looks like a word or phrase in a language that humans speak.
Problem 6
For Exercises 1-27, mark the answers true or false as follows: A. True B. False CAPTCHA is a software mechanism that authenticates a particular user before allowing him or her to post a comment to a blog.
Problem 7
For Exercises 1-27, mark the answers true or false as follows: A. True B. False The reCAPTCHA project serves a secondary purpose-to help digitize books.
Problem 9
For Exercises 1-27, mark the answers true or false as follows: A. True B. False The Touch ID biometric system uses retinal scans for user validation.
Problem 10
For Exercises 1-27, mark the answers true or false as follows: A. True B. False A computer virus "infects" another program by embedding itself into that program.
Problem 11
For Exercises 1-27, mark the answers true or false as follows: A. True B. False The terms "Trojan horse" and "worm" are used interchangeably to describe a particular category of malicious code.
Problem 12
For Exercises 1-27, mark the answers true or false as follows: A. True B. False A logic bomb is set to go off when a particular system event occurs, such as a particular date and time.