Like the Kerberos protocol, SESAME is also subject to which of the following?

Like the Kerberos protocol, SESAME is also subject to which of the following?A .  timeslot replayB .  password guessingC .  symmetric key guessingD .  asymmetric key guessingView AnswerAnswer: B Explanation: Sesame is an authentication and access control protocol, that also supports communication confidentiality and integrity. It provides public key based...

March 13, 2019 No Comments READ MORE +

Which of the following is the most reliable authentication method for remote access?

Which of the following is the most reliable authentication method for remote access?A .  Variable callback systemB .  Synchronous tokenC .  Fixed callback systemD .  Combination of callback and caller IDView AnswerAnswer: B Explanation: A Synchronous token generates a one-time password that is only valid for a short period of time....

March 13, 2019 No Comments READ MORE +

Which control would prevent the users from obtaining an individual employee’s salary?

Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual employee’s salary?A . Limit access to predefined queriesB . Segregate the database into a small number of partitions each with a separate security levelC...

March 13, 2019 No Comments READ MORE +

RADIUS incorporates which of the following services?

RADIUS incorporates which of the following services?A .  Authentication server and PIN codes.B .  Authentication of clients and static passwords generation.C .  Authentication of clients and dynamic passwords generation.D .  Authentication server as well as support for Static and Dynamic passwords.View AnswerAnswer: D Explanation: According to RFC 2865: A Network Access...

March 12, 2019 No Comments READ MORE +

How is Annualized Loss Expectancy (ALE) derived from a threat?

How is Annualized Loss Expectancy (ALE) derived from a threat?A . ARO x (SLE - EF)B . SLE x AROC . SLE/EFD . AV x EFView AnswerAnswer: B

March 12, 2019 No Comments READ MORE +

What physical characteristic does a retinal scan biometric device measure?

What physical characteristic does a retinal scan biometric device measure?A .  The amount of light reaching the retinaB .  The amount of light reflected by the retinaC .  The pattern of light receptors at the back of the eyeD .  The pattern of blood vessels at the back of the...

March 12, 2019 No Comments READ MORE +

Which of the following BEST describes what has occurred?

An Intrusion Detection System (IDS) has recently been deployed in a Demilitarized Zone (DMZ). The IDS detects a flood of malformed packets. Which of the following BEST describes what has occurred?A . Denial of Service (DoS) attackB . Address Resolution Protocol (ARP) spoofC . Buffer overflowD . Ping flood attackView...

March 12, 2019 No Comments READ MORE +

What is called the access protection system that limits connections by calling back the number of a previously authorized location?

What is called the access protection system that limits connections by calling back the number of a previously authorized location?A .  Sendback systemsB .  Callback forward systemsC .  Callback systemsD .  Sendback forward systemsView AnswerAnswer: C Explanation: The Answer Call back Systems; Callback systems provide access protection by calling back...

March 12, 2019 No Comments READ MORE +

Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?

Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?A . Hashing the data before encryptionB . Hashing the data after encryptionC . Compressing the data after encryptionD . Compressing the data before encryptionView AnswerAnswer: A Section: Security Architecture and Engineering Explanation

March 12, 2019 No Comments READ MORE +

Intellectual property rights are PRIMARY concerned with which of the following?

Intellectual property rights are PRIMARY concerned with which of the following?A . Owner’s ability to realize financial gainB . Owner’s ability to maintain copyrightC . Right of the owner to enjoy their creationD . Right of the owner to control delivery methodView AnswerAnswer: D

March 11, 2019 No Comments READ MORE +