• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Which one of the following is an example of a logical access control?

Password.

-Key for a lock.


-Password.


-Access Card.


-Fence.

During which phase of the access control process does the system answer the question, "What can the requester access?"

Authorization.

-Identification.


-Authentication.


-Authorization.


-Accountability.

The __________ is the central part of a computing environment's hardware, software, and firmware that enforces access control.

Security Kernel.

- Security Kernel.


- CPU.


- Memory.


-Co-Processor.

Which type of authentication includes smart cards?

Ownership.

- Knowledge.


- Ownership.


- Location.


- Action.

Which one of the following in an example of two-factor authentication?

Smart card and personal identification number (PIN).

-Smart card and personal identification number (PIN).


- Personal identification number (PIN) and password.


- Password and security questions.


- Token and smart card.

Which type of password attack attempts all possible combinations of a password in an attempt to guess the correct value?

Brute-force attack.

- Dictionary attack.


- Rainbow table attack.


- Social engineering attack.


- Brute-force attack.

Which one of the following is NOT a commonly accepted best practice for password security?

Use at least six alphanumeric characters.

- Use at least six alphanumeric characters.


-Do not include usernames in passwords.


- Include a special character in passwords.


- Include a mixture of uppercase characters, lowercase characters, and numbers in passwords.

Which characteristic of a biometric system measures the system's accuracy using a balance of different error types?

Crossover Error Rate (CER).

- False Acceptance Rate (FAR).


- False Rejection Rate (FRR).


- Crossover Error Rate (CER).


- Reaction Time.

Alan is evaluating different biometric systems and is concerned that users might not want to subject themselves to retinal scans due to privacy concerns. Which characteristic of a biometric system is he considering?

Acceptability.

- Accuracy.


- Reaction Time.


- Dynamism.


- Acceptability.

Which one of the following is NOT an advantage of biometric systems?

Physical characteristics may change.

- Biometrics require physical presence.


- Biometrics are hard to fake.


- Users do not need to remember anything.


- Physical Characteristics may change.

What is a single sign-on (SSO) approach that relies upon the use of key distribution centers (KDC's) and ticket-granting servers (TGS's)?

Kerberos.

- Secure European System for Applications in a Multi-Vendor Envrionment (SESAME).


- Lightweight Directory Access Protocol (LDAP).


- Security Assertion Markup Language (SAML).


- Kerberos.

Which of the following is an example of a hardware security control?

MAC Filtering.

- NTFS Permission.


- MAC Filtering.


- ID Badge.


- Security Policy.

Gary would like to choose an access control model in which the owner of a resource decides who may modify permissions on that resource. Which model fits that scenario?

Discretionary Access Control (DAC).

- Discretionary Access Control (DAC).


- Mandatory Access Control (MAC).


- Rule-based Access Control.


- Role-based Access Control (RBAC).

Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different officers to enter their access codes before allowing the system to engage. Which principle of security is this following?

Separation Of Duties.

- Least Privilege.


- Security Through Obscurity.


- Need To Know.


- Separation Of Duties.

Which security model does NOT protect the integrity of information?

Bell-LaPadula.

- Bell-LaPadula.


- Clark-Wilson.


- Biba.


- Brewer and Nash.

Which one of the following principles is NOT a component of the Biba integrity model?

Subjects cannot change objects that have a lower integrity level.

- Subjects cannot read objects that have a lower level of integrity than the subject.


- Subjects cannot change objects that have a lower level integrity level.


- Subjects at a given integrity level can call up only subjects at the same integrity level or lower.


- A subject may not ask for service from subjects that have a higher integrity level.

Which of the following does NOT offer authentication, authorization, and accounting (AAA) services?

Redundant Array of Independent Disks (RAID).

- Remote Authentication Dial-In User Service (RADIUS).


- Terminal Access Controller Access Control System Plus (TACACS+).


- Redundant Array of Independent Disks (RAID).


- DIAMETER.

What is an XML-based open standard for exchanging authentication and authorization information and is commonly used for web applications?

Security Assertion Markup Language (SAML).

- Security Assertion Markup Language (SAML).


- Secure European System for Applications in a Multi-Vendor Environment (SESAME).


- User Datagram Protocol (UDP).


- Password Authentication Protocol (PAP).

Which of the following is NOT a benefit of cloud computing to organizations?

Lower Dependence On Outside Vendors.

- On-demand provisioning.


- Improved disaster recovery.


- No need to maintain a data center.


- Lower dependence on outside vendors.