0% found this document useful (0 votes)
33 views6 pages

Questions: Unit - 5 Artificial Intelligence For Cyber Security

Notes

Uploaded by

Divya Bharathi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views6 pages

Questions: Unit - 5 Artificial Intelligence For Cyber Security

Notes

Uploaded by

Divya Bharathi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Artificia

Questions

What is the primary purpose of two-factor authentication (2FA)?


Which authentication method uses unique physical or behavioral
attributes for identification?

What is the purpose of Captcha in the context of authentication?


Which approach involves responding to security incidents after they
occur?

What does UEBA stand for in the context of security?


What aspect of user behavior does keystroke dynamics focus on for
identification?
How does anomaly detection with keystroke dynamics contribute to
security?
Which biometric authentication method relies on recognizing facial
features?

What is Eigenfaces in the context of facial recognition?

Which of the following is a common method for managing fake logins?

What does Multi-step Verification aim to achieve in login processes?


How does educating users about phishing attacks contribute to fake login
management?
What is the primary focus of behavioral analytics in the context of
security?

What is the purpose of User and Entity Behavior Analytics (UEBA)?


What does Keystroke Dynamics primarily analyze for identification
purposes?
is the earliest point at which the reduce method of a given
Reducer can be called.
Apache Cassandra is a massively scalable open source

Cassandra uses a protocol called to discover loc

A determines which data centers and racks to process


User accounts may be altered and dropped using the

Authorization capabilities for Cassandra use the familiar

Client-to-node encryption protects data in flight from client

Using file means you don’t have to overrid

Internal authentication stores usernames and bcrypt-hashement


A grants initial permissions, and subsequently

is one of many possible IAuthorizer implementation


Cassandra creates a for each table

When contents exceed a configurable thresome in


hashment,
Data in the commit log is purged after its corresponding duration of ____

For each SSTable, Cassandra creates index .

Cassandra marks data to be deleted using :

Tombstones exist for a configured time period defined by

is a Cassandra feature that optimizes the clust

Cassandra searches the to determine the app

You configure sample frequency by changing the

The compression offset map grows to GB per teraby


Unit -5
Artificial Intelligence for Cyber Security
Options 1 Option 2 Option 3
Increasing security by requiring
Providing a single two different authentication
Enhancing user experience authentication factor factors

Token-based authentication Single Sign-On (SSO) Biometric authentication


Preventing automated bots
Enhancing user experience from attempting fake logins Simplifying the login process

Reactive measures Predictive measures Both a and b


Unified Endpoint Behavior User and Entity Behavior Unauthenticated Entity
Analysis Analytics Behavior Assessment

Mouse movements Typing rhythm and patterns Voice patterns


Identifying abnormal Enhancing user experience Providing additional encryption
behaviors in typing patterns during typing for keystrokes

Fingerprint recognition Retina scan Facial recognition


A facial recognition technique
A new biometric using principal component
authentication method A type of facial makeup analysis (PCA)

Captcha Single Sign-On (SSO) Predictive analysis


Increasing security by adding
Simplifying the login process multiple verification steps Enhancing user experience
Reduces the need for Empowers users to identify and
Increases user experience authentication avoid fake login attempts
Understanding patterns and Identifying software
Analyzing network traffic behaviors of users and entities vulnerabilities
Analyzing user and entity
behavior patterns to detect Providing a single
Enhancing user experience abnormal activities authentication factor

Facial features Mouse movements Typing rhythm and patterns


As soon as at least one As soon as a mapper has Not until all mappers have
mapper has finished emitted at least one record. finished processing all records.
processing its input
SQL NoSQL NewSQL

gossip intergos goss

Client reque Snitch Partitioner


Hive Cassandra Sqoop

COMMIT GRANT ROLLBACK

SSL SSH SSN

qlshrc cqshrc cqlshrc

system_auth system_auth.cred system.credentials


keyspace superuser sudouser

CassandraA CassandraAutho CassAuthorizer


directory subdirectory domain

subtable memtable intable

SSHables SSTable Memtables

memory partition in memory

tombstone combstone tenstone

gc_grace_m gc_grace_time gc_grace_seconds

Hinted hand Hinted handoff Tombstone

partition rec partition summar partition search

index_time index_interval index_secs

1-3 10-16 20-22


y
Option 4 Answers
Increasing security by requiring
two different authentication
Simplifying the login process factors

Captcha Biometric authentication


Providing an additional layer Preventing automated bots
of encryption from attempting fake logins

None of the above Reactive measures


User Experience-Based User and Entity Behavior
Authentication Analytics

Facial expressions Typing rhythm and patterns


Identifying abnormal
Simplifying the login process behaviors in typing patterns

Voice recognition Facial recognition


A facial recognition technique
A brand of facial recognition using principal component
cameras analysis (PCA)

Token-based authentication Captcha


Allowing unlimited login Increasing security by adding
attempts multiple verification steps
Empowers users to identify and
Slows down the login process avoid fake login attempts
Enhancing encryption Understanding patterns and
algorithms behaviors of users and entities
Analyzing user and entity
Reacting to security incidents behavior patterns to detect
after they occur abnormal activities

Voice patterns Typing rhythm and patterns


Not until all mappers have
It depends on the finished processing all
InputFormat used for the job. records.
Oracle NoSQL

internalgos gossip

non-partitioner Snitch
Lucene Cassandra

TRIGGER GRANT

SLS SSL

qlc cqlshrc

system_auth.cre dentials
sys_auth.credentials
unuser superuser

CassandraAuth orizer
Authorizer
path subdirectory

memorytable memtable

SLSTable SSTable

syncronize partition

stone tombstone

gc_grace_secon ds
gc_grace_hours

Hinted tomb Hinted handoff

partition
partition file summary
indexed index_interval

0-1 1-3

You might also like