Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Which of the following represents the columns of the table in a relational database?
|
attributes
|
|
Which access control model is best suited in an environment where a high security level is required and where it is desired that only the administrator grants access control?
|
MAC
|
|
A confidential number to verify a user's identity is called a:
|
PIN.
|
|
Which of the following would NOT be considered a Denial of Service Attack?
|
Zone Transfer
|
|
Which of the following biometrics devices has the highest Crossover Error Rate (CER)?
|
Voice pattern
|
|
What can be defined as a table of subjects and objects indicating what actions individual subjects can take upon individual objects?
|
An access control matrix
|
|
What is called the percentage of invalid subjects that are falsely accepted?
Access Control |
False Acceptance Rate (FAR) or Type II Error
|
|
In biometric identification systems, at the beginning, it was soon apparent that truly positive identification could only be based on physical attributes of a person. This raised the necessicity of answering 2 questions
Access Control |
what part of body to be used and how to accomplish identification to be viable
|
|
Which of the following could inappropriately capture network user passwords?
Access Control |
Sniffing
|
|
What does the * (star) integrity axiom mean in the Biba model?
Access Control |
No write up
|
|
Why would anomaly detection IDSs often generate a large number of false positives?
Access Control |
Because normal patterns of user and system behavior can vary wildly.
|
|
Which of the following statements pertaining to Kerberos is false?
Access Control |
Kerberos uses public key cryptography.
|
|
What does the Clark-Wilson security model focus on?
Access Control Security Architecture and Design |
Integrity
|
|
The primary service provided by Kerberos is which of the following?
Access Control |
authentication
|
|
Which security model uses division of operations into different parts and requires different users to perform each part?
Access Control Security Architecture and Design |
Clark-Wilson model
|
|
What are cognitive passwords?
Access Control |
Fact- or opinion-based information used to verify an individual's identity.
|
|
In biometric identification systems, false accept rate is associated with:
Access Control |
Type 2 errors
|
|
What is the primary goal of setting up a honeypot?
Access Control |
To know when certain types of attacks are in progress and to learn about attack techniques so the network can be fortified.
|
|
Which of the following would NOT be considered a Denial of Service Attack?
# Zone Transfer # Smurf # Syn Flood # TearDrop |
Zone Transfer
|
|
The throughput rate is the rate at which individuals, once enrolled, can be processed and identified or authenticated by a system. Acceptable throughput rates are in the range of:
|
10 subjects per minute.
|