Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following would assist the most in Host Based intrusion detection?

A.

audit trails.

B.

access control lists.

C.

security clearances.

D.

host-based authentication.

What is called the percentage at which the False Rejection Rate equals the False Acceptance Rate?

A.

False Rejection Rate (FRR) or Type I Error

B.

False Acceptance Rate (FAR) or Type II Error

C.

Crossover Error Rate (CER)

D.

Failure to enroll rate (FTE or FER)

What is called an automated means of identifying or authenticating the identity of a living person based on physiological or behavioral characteristics?

A.

Biometrics

B.

Micrometrics

C.

Macrometrics

D.

MicroBiometrics

Which of the following is most appropriate to notify an external user that session monitoring is being conducted?

A.

Logon Banners

B.

Wall poster

C.

Employee Handbook

D.

Written agreement

The primary service provided by Kerberos is which of the following?

A.

non-repudiation

B.

confidentiality

C.

authentication

D.

authorization

Which of the following statements pertaining to biometrics is FALSE?

A.

User can be authenticated based on behavior.

B.

User can be authenticated based on unique physical attributes.

C.

User can be authenticated by what he knows.

D.

A biometric system's accuracy is determined by its crossover error rate (CER).

Which is the last line of defense in a physical security sense?

A.

people

B.

interior barriers

C.

exterior barriers

D.

perimeter barriers

Which of the following is NOT a form of detective administrative control?

A.

Rotation of duties

B.

Required vacations

C.

Separation of duties

D.

Security reviews and audits

A confidential number used as an authentication factor to verify a user's identity is called a:

A.

PIN

B.

User ID

C.

Password

D.

Challenge

Which division of the Orange Book deals with discretionary protection (need-to-know)?

A.

D

B.

C

C.

B

D.

A

Because all the secret keys are held and authentication is performed on the Kerberos TGS and the authentication servers, these servers are vulnerable to:

A.

neither physical attacks nor attacks from malicious code.

B.

physical attacks only

C.

both physical attacks and attacks from malicious code.

D.

physical attacks but not attacks from malicious code.

What security model is dependent on security labels?

A.

Discretionary access control

B.

Label-based access control

C.

Mandatory access control

D.

Non-discretionary access control

For maximum security design, what type of fence is most effective and cost-effective method (Foot are being used as measurement unit below)?

A.

3' to 4' high

B.

6' to 7' high

C.

8' high and above with strands of barbed wire

D.

Double fencing

Guards are appropriate whenever the function required by the security program involves which of the following?

A.

The use of discriminating judgment

B.

The use of physical force

C.

The operation of access control devices

D.

The need to detect unauthorized access

Controls like guards and general steps to maintain building security, securing of server rooms or laptops, the protection of cables, and usage of magnetic switches on doors and windows are some of the examples of:

A.

Administrative controls

B.

Logical controls

C.

Technical controls

D.

Physical controls

Which of the following can best eliminate dial-up access through a Remote Access Server as a hacking vector?

A.

Using a TACACS+ server.

B.

Installing the Remote Access Server outside the firewall and forcing legitimate users to authenticate to the firewall.

C.

Setting modem ring count to at least 5.

D.

Only attaching modems to non-networked hosts.

A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:

A.

concern that the laser beam may cause eye damage

B.

the iris pattern changes as a person grows older.

C.

there is a relatively high rate of false accepts.

D.

the optical unit must be positioned so that the sun does not shine into the aperture.

Which of the following Kerberos components holds all users' and services' cryptographic keys?

A.

The Key Distribution Service

B.

The Authentication Service

C.

The Key Distribution Center

D.

The Key Granting Service

In biometrics, "one-to-many" search against database of stored biometric images is done in:

A.

Authentication

B.

Identification

C.

Identities

D.

Identity-based access control

To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:

A.

Access Rules

B.

Access Matrix

C.

Identification controls

D.

Access terminal