The Terminal Access Controller Access Control System (TACACS) employs which of the following?
The Terminal Access Controller Access Control System (TACACS) employs which of the following?A . a user ID and static password for network accessB . a user ID and dynamic password for network accessC . a user ID and symmetric password for network accessD . a user ID and asymmetric password...
What is called a system that is capable of detecting that a fault has occurred and has the ability to correct the fault or operate around it?
What is called a system that is capable of detecting that a fault has occurred and has the ability to correct the fault or operate around it?A . A fail safe systemB . A fail soft systemC . A fault-tolerant systemD . A failover systemView AnswerAnswer: C Explanation: A fault-tolerant...
A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:
A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:A . concern that the laser beam may cause eye damageB . the iris pattern changes as a person grows older.C . there is a...
A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?
A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?A . Covert channelB . Overt channelC . Opened channelD . Closed channelView AnswerAnswer: B Explanation: An overt channel is a path within a computer system or network that is...
IT security measures should:
IT security measures should:A . Be complexB . Be tailored to meet organizational security goals.C . Make sure that every asset of the organization is well protected.D . Not be developed in a layered fashion.View AnswerAnswer: B Explanation: In general, IT security measures are tailored according to an organization's unique...
What does the simple security (ss) property mean in the Bell-LaPadula model?
What does the simple security (ss) property mean in the Bell-LaPadula model?A . No read upB . No write downC . No read downD . No write upView AnswerAnswer: A Explanation: The ss (simple security) property of the Bell-LaPadula access control model states that reading of information by a subject...
Which of the following access control models introduces user security clearance and data classification?
Which of the following access control models introduces user security clearance and data classification?A . Role-based access controlB . Discretionary access controlC . Non-discretionary access controlD . Mandatory access controlView AnswerAnswer: D Explanation: The mandatory access control model is based on a security label system. Users are given a security...
In biometrics, the "one-to-one" search used to verify claim to an identity made by a person is considered:
In biometrics, the "one-to-one" search used to verify claim to an identity made by a person is considered:A . AuthenticationB . IdentificationC . AuditingD . AuthorizationView AnswerAnswer: A Explanation: Biometric devices can be use for either IDENTIFICATION or AUTHENTICATION ONE TO ONE is for AUTHENTICATION This means that you as...
The following is NOT a security characteristic we need to consider while choosing a biometric identification systems:
The following is NOT a security characteristic we need to consider while choosing a biometric identification systems:A . data acquisition processB . costC . enrollment processD . speed and user interfaceView AnswerAnswer: B Explanation: Cost is a factor when considering Biometrics but it is not a security characteristic. All the other...
What security model is dependent on security labels?
What security model is dependent on security labels?A . Discretionary access controlB . Label-based access controlC . Mandatory access controlD . Non-discretionary access controlView AnswerAnswer: C Explanation: With mandatory access control (MAC), the authorization of a subject's access to an object is dependant upon labels, which indicate the subject's clearance,...