What can be defined as a list of subjects along with their access rights that are authorized to access a specific object?

What can be defined as a list of subjects along with their access rights that are authorized to access a specific object?A .  A capability tableB .  An access control listC .  An access control matrixD .  A role-based matrixView AnswerAnswer: B Explanation: "It [ACL] specifies a list of users...

October 18, 2018 No Comments READ MORE +

Crime Prevention Through Environmental Design (CPTED) is a discipline that:

Crime Prevention Through Environmental Design (CPTED) is a discipline that:A .  Outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior.B .  Outlines how the proper design of the logical environment can reduce crime by directly affecting human behavior.C .  Outlines how the...

October 18, 2018 No Comments READ MORE +

An effective information security policy should not have which of the following characteristic?

An effective information security policy should not have which of the following characteristic?A .  Include separation of dutiesB .  Be designed with a short- to mid-term focusC .  Be understandable and supported by all stakeholdersD .  Specify areas of responsibility and authorityView AnswerAnswer: B Explanation: An effective information security policy should...

October 18, 2018 No Comments READ MORE +

Which of the following is the act of performing tests and evaluations to test a system's security level to see if it complies with the design specifications and security requirements?

Which of the following is the act of performing tests and evaluations to test a system's security level to see if it complies with the design specifications and security requirements?A .  ValidationB .  VerificationC .  AssessmentD .  AccuracyView AnswerAnswer: B Explanation: Verification vs. Validation: Verification determines if the product accurately represents...

October 18, 2018 No Comments READ MORE +

The security of a computer application is most effective and economical in which of the following cases?

The security of a computer application is most effective and economical in which of the following cases?A .  The system is optimized prior to the addition of security.B .  The system is procured off-the-shelf.C .  The system is customized to meet the specific security threat.D .  The system is originally...

October 16, 2018 No Comments READ MORE +

Kerberos can prevent which one of the following attacks?

Kerberos can prevent which one of the following attacks?A .  tunneling attack.B .  playback (replay) attack.C .  destructive attack.D .  process attack.View AnswerAnswer: B Explanation: Each ticket in Kerberos has a timestamp and are subject to time expiration to help prevent these types of attacks. The following answers are incorrect:...

October 16, 2018 No Comments READ MORE +

Which of the following phases of a system development life-cycle is most concerned with establishing a good security policy as the foundation for design?

Which of the following phases of a system development life-cycle is most concerned with establishing a good security policy as the foundation for design?A .  Development/acquisitionB .  ImplementationC .  InitiationD .  MaintenanceView AnswerAnswer: C Explanation: A security policy is an important document to develop while designing an information system. The...

October 16, 2018 No Comments READ MORE +

Which of the following protects a password from eavesdroppers and supports the encryption of communication?

Which of the following protects a password from eavesdroppers and supports the encryption of communication?A .  Challenge Handshake Authentication Protocol (CHAP)B .  Challenge Handshake Identification Protocol (CHIP)C .  Challenge Handshake Encryption Protocol (CHEP)D .  Challenge Handshake Substitution Protocol (CHSP)View AnswerAnswer: A Explanation: CHAP: A protocol that uses a three way...

October 16, 2018 No Comments READ MORE +

What can be described as an imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?

What can be described as an imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?A .  The security kernelB .  The reference monitorC .  The security perimeterD .  The reference perimeterView AnswerAnswer: C Explanation: The security perimeter is the imaginary line that...

October 16, 2018 No Comments READ MORE +

Why does compiled code pose more of a security risk than interpreted code?

Why does compiled code pose more of a security risk than interpreted code?A .  Because malicious code can be embedded in compiled code and be difficult to detect.B .  If the executed compiled code fails, there is a chance it will fail insecurely.C .  Because compilers are not reliable.D ....

October 15, 2018 No Comments READ MORE +