Artificia
Questions
What is the primary purpose of two-factor authentication (2FA)?
Which authentication method uses unique physical or behavioral
attributes for identification?
What is the purpose of Captcha in the context of authentication?
Which approach involves responding to security incidents after they
occur?
What does UEBA stand for in the context of security?
What aspect of user behavior does keystroke dynamics focus on for
identification?
How does anomaly detection with keystroke dynamics contribute to
security?
Which biometric authentication method relies on recognizing facial
features?
What is Eigenfaces in the context of facial recognition?
Which of the following is a common method for managing fake logins?
What does Multi-step Verification aim to achieve in login processes?
How does educating users about phishing attacks contribute to fake login
management?
 What is the primary focus of behavioral analytics in the context of
 security?
 What is the purpose of User and Entity Behavior Analytics (UEBA)?
 What does Keystroke Dynamics primarily analyze for identification
 purposes?
        is the earliest point at which the reduce method of a given
Reducer can be called.
Apache Cassandra is a massively scalable open source
Cassandra uses a protocol called          to discover loc
A              determines which data centers and racks to process
User accounts may be altered and dropped using the
Authorization capabilities for Cassandra use the familiar
Client-to-node encryption protects data in flight from client
Using                file means you don’t have to overrid
Internal authentication stores usernames and bcrypt-hashement
A             grants initial permissions, and subsequently
            is one of many possible IAuthorizer implementation
Cassandra creates a              for each table
When                 contents exceed a configurable thresome in
hashment,
Data in the commit log is purged after its corresponding duration of ____
For each SSTable, Cassandra creates               index .
Cassandra marks data to be deleted using :
Tombstones exist for a configured time period defined by
            is a Cassandra feature that optimizes the clust
Cassandra searches the                to determine the app
You configure sample frequency by changing the
The compression offset map grows to          GB per teraby
                                                  Unit -5
                               Artificial Intelligence for Cyber Security
Options 1                       Option 2                          Option 3
                                                                  Increasing security by requiring
                                Providing a single                two different authentication
Enhancing user experience       authentication factor             factors
Token-based authentication      Single Sign-On (SSO)              Biometric authentication
                                Preventing automated bots
Enhancing user experience       from attempting fake logins       Simplifying the login process
Reactive measures               Predictive measures               Both a and b
Unified Endpoint Behavior       User and Entity Behavior          Unauthenticated Entity
Analysis                        Analytics                         Behavior Assessment
Mouse movements                 Typing rhythm and patterns        Voice patterns
 Identifying abnormal           Enhancing user experience         Providing additional encryption
behaviors in typing patterns    during typing                     for keystrokes
Fingerprint recognition         Retina scan                        Facial recognition
                                                                  A facial recognition technique
A new biometric                                                   using principal component
authentication method           A type of facial makeup           analysis (PCA)
Captcha                         Single Sign-On (SSO)              Predictive analysis
                              Increasing security by adding
Simplifying the login process multiple verification steps   Enhancing user experience
                                Reduces the need for              Empowers users to identify and
Increases user experience       authentication                    avoid fake login attempts
                                 Understanding patterns and       Identifying software
Analyzing network traffic       behaviors of users and entities   vulnerabilities
                                Analyzing user and entity
                                behavior patterns to detect       Providing a single
Enhancing user experience       abnormal activities               authentication factor
Facial features                 Mouse movements                   Typing rhythm and patterns
As soon as at least one         As soon as a mapper has           Not until all mappers have
mapper has finished             emitted at least one record.      finished processing all records.
processing its input
 SQL                             NoSQL                             NewSQL
 gossip                          intergos                          goss
 Client reque                    Snitch                            Partitioner
Hive            Cassandra          Sqoop
COMMIT          GRANT              ROLLBACK
SSL             SSH                SSN
qlshrc          cqshrc             cqlshrc
system_auth     system_auth.cred   system.credentials
keyspace        superuser          sudouser
CassandraA      CassandraAutho     CassAuthorizer
directory       subdirectory       domain
subtable        memtable           intable
SSHables        SSTable            Memtables
memory          partition          in memory
tombstone       combstone          tenstone
gc_grace_m      gc_grace_time      gc_grace_seconds
Hinted hand     Hinted handoff     Tombstone
partition rec   partition summar   partition search
index_time      index_interval     index_secs
1-3             10-16              20-22
y
    Option 4                       Answers
                                  Increasing security by requiring
                                  two different authentication
    Simplifying the login process factors
    Captcha                        Biometric authentication
    Providing an additional layer Preventing automated bots
    of encryption                 from attempting fake logins
    None of the above              Reactive measures
    User Experience-Based          User and Entity Behavior
    Authentication                 Analytics
    Facial expressions             Typing rhythm and patterns
                                   Identifying abnormal
    Simplifying the login process behaviors in typing patterns
    Voice recognition              Facial recognition
                                  A facial recognition technique
    A brand of facial recognition using principal component
    cameras                       analysis (PCA)
    Token-based authentication     Captcha
    Allowing unlimited login       Increasing security by adding
    attempts                       multiple verification steps
                                 Empowers users to identify and
    Slows down the login process avoid fake login attempts
    Enhancing encryption            Understanding patterns and
    algorithms                     behaviors of users and entities
                                   Analyzing user and entity
    Reacting to security incidents behavior patterns to detect
    after they occur               abnormal activities
    Voice patterns                Typing rhythm and patterns
                                  Not until all mappers have
    It depends on the             finished processing all
    InputFormat used for the job. records.
      Oracle                      NoSQL
     internalgos                   gossip
     non-partitioner               Snitch
Lucene                 Cassandra
TRIGGER                GRANT
SLS                    SSL
qlc                    cqlshrc
                       system_auth.cre dentials
sys_auth.credentials
unuser                 superuser
                       CassandraAuth orizer
Authorizer
path                   subdirectory
memorytable            memtable
SLSTable               SSTable
syncronize             partition
stone                  tombstone
                       gc_grace_secon ds
gc_grace_hours
Hinted tomb            Hinted handoff
                       partition
partition file         summary
indexed                index_interval
0-1                    1-3