Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Why should batch files and scripts be stored in a protected area?

A.

Because of the least privilege concept.

B.

Because they cannot be accessed by operators.

C.

Because they may contain credentials.

D.

Because of the need-to-know concept.

Which of the following classes is defined in the TCSEC (Orange Book) as discretionary protection?

A.

C

B.

B

C.

A

D.

D

Which of the following security controls might force an operator into collusion with personnel assigned organizationally within a different function in order to gain access to unauthorized data?

A.

Limiting the local access of operations personnel

B.

Job rotation of operations personnel

C.

Management monitoring of audit logs

D.

Enforcing regular password changes

How should a doorway of a manned facility with automatic locks be configured?

A.

It should be configured to be fail-secure.

B.

It should be configured to be fail-safe.

C.

It should have a door delay cipher lock.

D.

It should not allow piggybacking.

In biometric identification systems, the parts of the body conveniently available for identification are:

A.

neck and mouth

B.

hands, face, and eyes

C.

feet and hair

D.

voice and neck

What would be the name of a Logical or Virtual Table dynamically generated to restrict the information a user can access in a database?

A.

Database Management system

B.

Database views

C.

Database security

D.

Database shadowing

Which of the following is true of two-factor authentication?

A.

It uses the RSA public-key signature based on integers with large prime factors.

B.

It requires two measurements of hand geometry.

C.

It does not use single sign-on technology.

D.

It relies on two independent proofs of identity.

Access control is the collection of mechanisms that permits managers of a system to exercise a directing or restraining influence over the behavior, use, and content of a system. It does not permit management to:

A.

specify what users can do

B.

specify which resources they can access

C.

specify how to restrain hackers

D.

specify what operations they can perform on a system.

Like the Kerberos protocol, SESAME is also subject to which of the following?

A.

timeslot replay

B.

password guessing

C.

symmetric key guessing

D.

asymmetric key guessing

Which of the following would be true about Static password tokens?

A.

The owner identity is authenticated by the token

B.

The owner will never be authenticated by the token.

C.

The owner will authenticate himself to the system.

D.

The token does not authenticates the token owner but the system.

What does the (star) integrity axiom mean in the Biba model?

A.

No read up

B.

No write down

C.

No read down

D.

No write up

What is the most critical characteristic of a biometric identifying system?

A.

Perceived intrusiveness

B.

Storage requirements

C.

Accuracy

D.

Scalability

Which of the following statements pertaining to Kerberos is false?

A.

The Key Distribution Center represents a single point of failure.

B.

Kerberos manages access permissions.

C.

Kerberos uses a database to keep a copy of all users' public keys.

D.

Kerberos uses symmetric key cryptography.

Examples of types of physical access controls include all EXCEPT which of the following?

A.

badges

B.

locks

C.

guards

D.

passwords

When a biometric system is used, which error type deals with the possibility of GRANTING access to impostors who should be REJECTED?

A.

Type I error

B.

Type II error

C.

Type III error

D.

Crossover error

Which access model is most appropriate for companies with a high employee turnover?

A.

Role-based access control

B.

Mandatory access control

C.

Lattice-based access control

D.

Discretionary access control

Which of the following is not a two-factor authentication mechanism?

A.

Something you have and something you know.

B.

Something you do and a password.

C.

A smartcard and something you are.

D.

Something you know and a password.

Which of the following best ensures accountability of users for the actions taken within a system or domain?

A.

Identification

B.

Authentication

C.

Authorization

D.

Credentials

Which of the following is an example of discretionary access control?

A.

Identity-based access control

B.

Task-based access control

C.

Role-based access control

D.

Rule-based access control

How are memory cards and smart cards different?

A.

Memory cards normally hold more memory than smart cards

B.

Smart cards provide a two-factor authentication whereas memory cards don't

C.

Memory cards have no processing power

D.

Only smart cards can be used for ATM cards