Answer: A
Hint: The correct answer is A, Accountability is holding individuals responsible for their actions. Answers B, C, and D are the three goals of integrity.
Answer: D
Hint: The correct answer is D. Kerberos is a third-party authentication protocol that can be used to implement SSO. Answer a is incorrect because public key cryptography is not used in the basic Kerberos protocol. Answer B is a public key-based capability, and answer C is a one-way transformation used to disguise passwords or to implement digital signatures.
Answer: B
Hint: The correct answer is B. The fundamental entity in a relational database is the relation in the form of a table. Answer A is the set of allowable attribute values, and answers C and D are distracters.
Answer: B
Hint: The correct answer is B. Candidate keys,(answer A) are the set of unique keys from which the primary key is selected. Answer C, joins, indicates operations that can be performed on the database, and the attributes(d) denote the columns in the relational table.
Answer: B
Hint: The correct answer is B. Answer A is a review of audit system data, usually done after the fact. Answer C is holding individuals responsible for their actions, and answer D is obtaining higher-sensitivity information from a number of pieces of information of Jower sensitivity.
Answer: C
Hint: The correct answer is C. The other answers are different coategories of controls where preventive controls attempt or reduce vulnerabilities before an attack occurs; detective controls attempt to determine that an attack is taking place or has taken place; and corrective controls involve taking action to restore the system to normal operation after a successful attack.
Answer: A
Hint: The correct answer is A. Answers B and C are incorrect because a secondary key is not a valid term. Answer D is a distracter because referential integrity has a foreign key referring to a primary key in another relation.
Answer: B
Hint: The correct answer is B. In answer A, the password changes at each logon. For answer C, a passphrase is a long word or phase that is converted by the system to a password. In answer D, a one-time pad refers to a using a random key only once when sending a cryptographic message.
Answer: D
Hint: The correct answer is D, a distacter. A penetration test is conducted to obtain a high level evaluation of a system's defense or to perform a detailed analysis of the information system's weaknesses. A penetration test can determine how a system reacts to an attack, wheather or nota system's defenses can be breached, and what information can be acquired from the system. It is performed with the approval of the target organization.
Answer: C
Hint: The correct answer is C. In a dictionary attack, a dictionary of common words and passwords are applied to attempt to gain unauthorized access to an information system. In answer A, password guessing, the attacker guesses passwords derived from sources such as notes on the user's desk, the user's birthday, a pet's name, applying social engineering techniques, and so on. Answer B refers to exploiting software vulnerabilities and answer D, spoofing, is a method used by an attacker to convince an information system that it is communicating with a known, trusted entity.
Answer: A
Hint: The correct answer is A. A statistical anomaly-based intrusion detection system acquires data to establish a normal system opertaing profile. Answer B is incorrect because it is used in signature-based intrusion detection. Answer C is incorrect because a statistical anomaly-based intrusion detection system will not detect an attack tha does not significantly change the system operating characteristics. Similary, answer D is incorrect because the statistical anomaly-based IDS is susceptible to reporting an event that caused a momentary anomaly in the system.
Answer: D
Hint: The correct answer is D. Answer A describes a back door attack, answer B is a reply attack, and answer C refers to dumpster diving.
Answer: C
Hint: The correct answer is C, open box testing. In answer A, closed box testing, the testing team does not have access to internal system code. The other answers are distracters.
Answer: B
Hint: The correct answer is B. All other answers do not apply.
Answer: A
Hint: The correct answer is A. A cracker can have a person's call forwarded to anoher number to foil the callback system. Answer B is incorrect because it is an example of malicious code embedded in useful code. Answer C is incorrect because it might enable bypassing controls of a system through a means used for debugging or maintenance. Answer D is incorrect because it is a distracter.
Answer: B
Answer: B
Hint: The correct answer is B. Session keys are temporary keys assigned by the KDC and used for an allotted period of time as the secret key between two entities. Answer A is incorrect because it refers to asymmetric encryption that is not used in the basic Kerberos protocol. Answer C is incorrect because it is not a key, and answer D is incorrect because a token generates dynamic passwords.
Answer: B
Hint: The correct answer is B. Threats define the possible source of security policy violations; vulnerabilities describe weaknesses in the system that might be exploited by the threats; and the risk determines the probability of threats being realized. All three items must be present to meaningfully apply access control. Therefore, the other answers are incorrect.
Answer: A
Hint: The correct answer is A. Mandatory access controls use lables to determine wheather subjects can have access to objects, depending on the subjects' clearances. Answer B, roles, is applied in nondiscretionary access control, as is answer C, tasks. Answer D, identity, is used in discretionary access control.
Answer: D
Hint: The correct answer is D. Answers A and B require strict adherence to lables and clearances. Answer C is a made-up distracter.
Answer: B
Hint: The correct answer is B. Role-based access control is part of nondiscretionary access control. Answers A, C and D relate to mandatory access control.
Answer: C
Hint: The correct answer is C. Reducing the amount of data to be evaluated by definition. Answer A is incorrect because clipping levels do not relate to letters in a password. Answer B is incorrect because clipping levels in this context have nothing to do with controlling voltage levels. Answer D is incorrect because they are not used to limit callback errors.
Answer: D
Hint: The correct answer is D . A user presents an ID to the system as identification. Answer A is incorrect because presenting an ID is not an authentication act. Answer B is incorrect because a password is an authentication mechanism. Answer C is incorrect because it refers to cryptography or authentication.
Answer: A
Hint: The correct answer is A. Answer B is incorrect because it is an identification act. Answer C is incorrect because authentication can be accomplished through the use of a password. Answer D is incorrect because authentication is applied to local and remote users.
Answer: C
Hint: The correct answer is C. These items are something you know and something you have. Answer A is incorrect because essentially, only one factor is being used- something you know(password). Answer B is incorrect for the same reason. Answer D is incorrect because only one biometric is being used.
Answer: B
Hint: The correct answer is B. The other items are made-up distracters.
Answer: B
Hint: The correct answer is B. The features extracted from the fingerprint are stored. Answer A is incorrect because the equilvalent of the full fingerprint is not stored in finger scan technology. Answers C and D are incorrect because the opposite is true of finger scan technology.
Answer: C
Answer: A
Hint: The correct answer is A, a distracter.
Answer: C
Hint: The correct answer is C. The other answers are false because for answer A, relational databases are ideally suited to text-only information. For B and D, OODB systems have a steep learning curve and consume a large amount of system resources.