The Terminal Access Controller Access Control System (TACACS) employs which of the following?

The Terminal Access Controller Access Control System (TACACS) employs which of the following?A .  a user ID and static password for network accessB .  a user ID and dynamic password for network accessC .  a user ID and symmetric password for network accessD .  a user ID and asymmetric password...

September 29, 2018 No Comments READ MORE +

What is called a system that is capable of detecting that a fault has occurred and has the ability to correct the fault or operate around it?

What is called a system that is capable of detecting that a fault has occurred and has the ability to correct the fault or operate around it?A .  A fail safe systemB .  A fail soft systemC .  A fault-tolerant systemD .  A failover systemView AnswerAnswer: C Explanation: A fault-tolerant...

September 29, 2018 No Comments READ MORE +

A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:

A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:A .  concern that the laser beam may cause eye damageB .  the iris pattern changes as a person grows older.C .  there is a...

September 28, 2018 No Comments READ MORE +

A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?

A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?A .  Covert channelB .  Overt channelC .  Opened channelD .  Closed channelView AnswerAnswer: B Explanation: An overt channel is a path within a computer system or network that is...

September 28, 2018 No Comments READ MORE +

IT security measures should:

IT security measures should:A .  Be complexB .  Be tailored to meet organizational security goals.C .  Make sure that every asset of the organization is well protected.D .  Not be developed in a layered fashion.View AnswerAnswer: B Explanation: In general, IT security measures are tailored according to an organization's unique...

September 28, 2018 No Comments READ MORE +

What does the simple security (ss) property mean in the Bell-LaPadula model?

What does the simple security (ss) property mean in the Bell-LaPadula model?A .  No read upB .  No write downC .  No read downD .  No write upView AnswerAnswer: A Explanation: The ss (simple security) property of the Bell-LaPadula access control model states that reading of information by a subject...

September 26, 2018 No Comments READ MORE +

Which of the following access control models introduces user security clearance and data classification?

Which of the following access control models introduces user security clearance and data classification?A .  Role-based access controlB .  Discretionary access controlC .  Non-discretionary access controlD .  Mandatory access controlView AnswerAnswer: D Explanation: The mandatory access control model is based on a security label system. Users are given a security...

September 26, 2018 No Comments READ MORE +

In biometrics, the "one-to-one" search used to verify claim to an identity made by a person is considered:

In biometrics, the "one-to-one" search used to verify claim to an identity made by a person is considered:A .  AuthenticationB .  IdentificationC .  AuditingD .  AuthorizationView AnswerAnswer: A Explanation: Biometric devices can be use for either IDENTIFICATION or AUTHENTICATION ONE TO ONE is for AUTHENTICATION This means that you as...

September 26, 2018 No Comments READ MORE +

The following is NOT a security characteristic we need to consider while choosing a biometric identification systems:

The following is NOT a security characteristic we need to consider while choosing a biometric identification systems:A .  data acquisition processB .  costC .  enrollment processD .  speed and user interfaceView AnswerAnswer: B Explanation: Cost is a factor when considering Biometrics but it is not a security characteristic. All the other...

September 26, 2018 No Comments READ MORE +

What security model is dependent on security labels?

What security model is dependent on security labels?A .  Discretionary access controlB .  Label-based access controlC .  Mandatory access controlD .  Non-discretionary access controlView AnswerAnswer: C Explanation: With mandatory access control (MAC), the authorization of a subject's access to an object is dependant upon labels, which indicate the subject's clearance,...

September 25, 2018 No Comments READ MORE +