Which type of control is concerned with restoring controls?
Which type of control is concerned with restoring controls?A . Compensating controlsB . Corrective controlsC . Detective controlsD . Preventive controlsView AnswerAnswer: B Explanation: Corrective controls are concerned with remedying circumstances and restoring controls. Detective controls are concerned with investigating what happen after the fact such as logs and video surveillance...
Which of the following access control models is based on sensitivity labels?
Which of the following access control models is based on sensitivity labels?A . Discretionary access controlB . Mandatory access controlC . Rule-based access controlD . Role-based access controlView AnswerAnswer: B Explanation: Access decisions are made based on the clearance of the subject and the sensitivity label of the object. Example:...
In the context of Biometric authentication, what is a quick way to compare the accuracy of devices. In general, the device that have the lowest value would be the most accurate. Which of the following would be used to compare accuracy of devices?
In the context of Biometric authentication, what is a quick way to compare the accuracy of devices. In general, the device that have the lowest value would be the most accurate. Which of the following would be used to compare accuracy of devices?A . the CER is used.B . the...
Which of the following statements pertaining to protection rings is false?
Which of the following statements pertaining to protection rings is false?A . They provide strict boundaries and definitions on what the processes that work within each ring can access.B . Programs operating in inner rings are usually referred to as existing in a privileged mode.C . They support the CIA...
Which of the following would be an example of the best password?
Which of the following would be an example of the best password?A . golf001B . ElizabethC . T1me4g0lFD . passwordView AnswerAnswer: C Explanation: The best passwords are those that are both easy to remember and hard to crack using a dictionary attack. The best way to create passwords that fulfil...
Which of the following is the most reliable, secure means of removing data from magnetic storage media such as a magnetic tape, or a cassette?
Which of the following is the most reliable, secure means of removing data from magnetic storage media such as a magnetic tape, or a cassette?A . DegaussingB . Parity Bit ManipulationC . ZeroizationD . Buffer overflowView AnswerAnswer: A Explanation: A "Degausser (Otherwise known as a Bulk Eraser) has the main...
Which of the following forms of authentication would most likely apply a digital signature algorithm to every bit of data that is sent from the claimant to the verifier?
Which of the following forms of authentication would most likely apply a digital signature algorithm to every bit of data that is sent from the claimant to the verifier?A . Dynamic authenticationB . Continuous authenticationC . Encrypted authenticationD . Robust authenticationView AnswerAnswer: B Explanation: Continuous authentication is a type of...
In the Bell-LaPadula model, the Star-property is also called:
In the Bell-LaPadula model, the Star-property is also called:A . The simple security propertyB . The confidentiality propertyC . The confinement propertyD . The tranquility propertyView AnswerAnswer: B Explanation: The Bell-LaPadula model focuses on data confidentiality and access to classified information, in contrast to the Biba Integrity Model which describes...
Password management falls into which control category?
Password management falls into which control category?A . CompensatingB . DetectiveC . PreventiveD . TechnicalView AnswerAnswer: C Explanation: Password management is an example of preventive control. Proper passwords prevent unauthorized users from accessing a system. There are literally hundreds of different access approaches, control methods, and technologies, both in the physical...
An alternative to using passwords for authentication in logical or technical access control is:
An alternative to using passwords for authentication in logical or technical access control is:A . manage without passwordsB . biometricsC . not thereD . use of them for physical access controlView AnswerAnswer: B Explanation: An alternative to using passwords for authentication in logical or technical access control is biometrics. Biometrics...