• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back
Which of the following is true about MAC?
A. It is more flexible than DAC
B. It is more secure than DAC
C. It is less secure than DAC
D. It is more scalable than DAC
It is more secure than DAC
What defines an imposed access control level?
A. MAC
B. DAC
C. SAC
D. CAC
A. MAC
Under MAC, who can change the category of a resource?
A. All users.
B. Administrators only.
C. All managers.
D. None of the choices.
B. Administrators only.
You may describe MAC as:
A. Opportunistic
B. Prohibitive
C. None of the choices.
D. Permissive
B. Prohibitive
Under MAC, which of the following is true?
A. All that is expressly permitted is forbidden.
B. All that is not expressly permitted is forbidden.
C. All that is not expressly permitted is not forbidden.
D. None of the choices.
B. All that is not expressly permitted is forbidden.
DAC are characterized by many organizations as:
A. Need-to-know controls
B. Preventive controls
C. Mandatory adjustable controls
D. None of the choices
A. Need-to-know controls
Which of the following correctly describe DAC?
A. It is the most secure method.
B. It is of the B2 class.
C. It can extend beyond limiting which subjects can gain what type of access to which objects.
D. It is of the B1 class.
C. It can extend beyond limiting which subjects can gain what type of access to which objects.
Under DAC, a subjects rights must be ________ when it leaves an organization altogether.
A. recycled
B. terminated
C. suspended
D. resumed
B. terminated
DAC and MAC policies can be effectively replaced by:
A. Rule based access control.
B. Role based access control.
C. Server based access control.
D. Token based access control
B. Role based access control.
Which access control model enables the owner of the resource to specify what subjects can access specific resources?
A. Discretionary Access Control
B. Mandatory Access Control
C. Sensitive Access Control
D. Role-based Access Control
A. Discretionary Access Control
Which of the following is a means of restricting access to objects based on the identity of the
subject to which they belong?
A. Mandatory access control
B. Group access control
C. Discretionary access control
D. User access control
C. Discretionary access control
RAID levels 3 and 5 run:
A. faster on hardware
B. slower on hardware
C. faster on software
D. at the same speed on software and hardware
A. faster on hardware
Which of the following RAID levels functions as a single virtual disk?
A. RAID Level 7
B. RAID Level 5
C. RAID Level 10
D. RAID Level 2
D. RAID Level 2
Which of the following takes the concept of RAID 1 (mirroring) and applies it to a pair of servers?
A. A redundant server implementation
B. A redundant client implementation
C. A redundant guest implementation
D. A redundant host implementation
A. A redundant server implementation
Raid 0
striped set.
offers no redundancy and no fault tolerace
Raid 1
mirror.. exact duplicate on additional disk
Raid 2
not used it would require either 14 or 39 hard drives specially designed for controller
RAID 3
increased performance due to striping over multiple disks but no redundancy at byte level
Raid 4
same as RAID 3 but at block level
RAID 5
lose 1/3 of space. one of most popular stripes for performance disk cost lower than for mirror . allows for recovery if only one of the disk fails
RAID 6
allows the lost of two disks
RAID 1+0
one standard is encapsulated within another. striped set of mirrors
Threat agents
causing the threats
macro virus
infects code mostly Microsoft office
Worm
the can self propagate without user interactions
rootkit
is used for malware that is focused on hiding its own existence
Virus
must have a host
smurf
attack using an ICMP flood and directed broadcast addresses
teardrop
a malformed packet DoS attack that targets issues with systems' fragmentation reassembly
Ping of Death
Dental of service which sends a malformed ICMP Echo Request Ping that is larger than the maximum size of an IP packet
fraggle
smurf attack variation which uses UDP instead of ICMP