Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following exemplifies proper separation of duties?

A.

Operators are not permitted modify the system time.

B.

Programmers are permitted to use the system console.

C.

Console operators are permitted to mount tapes and disks.

D.

Tape operators are permitted to use the system console.

Which of the following is related to physical security and is not considered a technical control?

A.

Access control Mechanisms

B.

Intrusion Detection Systems

C.

Firewalls

D.

Locks

The number of violations that will be accepted or forgiven before a violation record is produced is called which of the following?

A.

clipping level

B.

acceptance level

C.

forgiveness level

D.

logging level

Which of the following is the WEAKEST authentication mechanism?

A.

Passphrases

B.

Passwords

C.

One-time passwords

D.

Token devices

Controls provide accountability for individuals who are accessing sensitive information. This accountability is accomplished:

A.

through access control mechanisms that require identification and authentication and through the audit function.

B.

through logical or technical controls involving the restriction of access to systems and the protection of information.

C.

through logical or technical controls but not involving the restriction of access to systems and the protection of information.

D.

through access control mechanisms that do not require identification and authentication and do not operate through the audit function.

Which access control model enables the OWNER of the resource to specify what subjects can access specific resources based on their identity?

A.

Discretionary Access Control

B.

Mandatory Access Control

C.

Sensitive Access Control

D.

Role-based Access Control

Making sure that the data has not been changed unintentionally, due to an accident or malice is:

A.

Integrity.

B.

Confidentiality.

C.

Availability.

D.

Auditability.

What can best be defined as high-level statements, beliefs, goals and objectives?

A.

Standards

B.

Policies

C.

Guidelines

D.

Procedures

Which of the following is not a method to protect objects and the data within the objects?

A.

Layering

B.

Data mining

C.

Abstraction

D.

Data hiding

Which of the following is NOT a common integrity goal?

A.

Prevent unauthorized users from making modifications.

B.

Maintain internal and external consistency.

C.

Prevent authorized users from making improper modifications.

D.

Prevent paths that could lead to inappropriate disclosure.

The Information Technology Security Evaluation Criteria (ITSEC) was written to address which of the following that the Orange Book did not address?

A.

integrity and confidentiality.

B.

confidentiality and availability.

C.

integrity and availability.

D.

none of the above.

Which of the following rules is least likely to support the concept of least privilege?

A.

The number of administrative accounts should be kept to a minimum.

B.

Administrators should use regular accounts when performing routine operations like reading mail.

C.

Permissions on tools that are likely to be used by hackers should be as restrictive as possible.

D.

Only data to and from critical systems and applications should be allowed through the firewall.

Which of the following is most concerned with personnel security?

A.

Management controls

B.

Operational controls

C.

Technical controls

D.

Human resources controls

Which of the following is the MOST important aspect relating to employee termination?

A.

The details of employee have been removed from active payroll files.

B.

Company property provided to the employee has been returned.

C.

User ID and passwords of the employee have been deleted.

D.

The appropriate company staff are notified about the termination.

What does "System Integrity" mean?

A.

The software of the system has been implemented as designed.

B.

Users can't tamper with processes they do not own.

C.

Hardware and firmware have undergone periodic testing to verify that they are functioning properly.

D.

Design specifications have been verified against the formal top-level specification.

Related to information security, integrity is the opposite of which of the following?

A.

abstraction

B.

alteration

C.

accreditation

D.

application

Which of the following security controls might force an operator into collusion with personnel assigned organizationally within a different function in order to gain access to unauthorized data?

A.

Limiting the local access of operations personnel

B.

Job rotation of operations personnel

C.

Management monitoring of audit logs

D.

Enforcing regular password changes

Risk reduction in a system development life-cycle should be applied:

A.

Mostly to the initiation phase.

B.

Mostly to the development phase.

C.

Mostly to the disposal phase.

D.

Equally to all phases.

Making sure that only those who are supposed to access the data can access is which of the following?

A.

confidentiality.

B.

capability.

C.

integrity.

D.

availability.

The Reference Validation Mechanism that ensures the authorized access relationships between subjects and objects is implementing which of the following concept:

A.

The reference monitor.

B.

Discretionary Access Control.

C.

The Security Kernel.

D.

Mandatory Access Control.