In which of the following model are Subjects and Objects identified and the permissions applied to each subject/object combination are specified. Such a model can be used to quickly summarize what permissions a subject has for various system objects.

In which of the following model are Subjects and Objects identified and the permissions applied to each subject/object combination are specified. Such a model can be used to quickly summarize what permissions a subject has for various system objects.A .  Access Control Matrix modelB .  Take-Grant modelC .  Bell-LaPadula modelD...

February 25, 2019 No Comments READ MORE +

Which security model ensures that actions that take place at a higher security level do not affect actions that take place at a lower level?

Which security model ensures that actions that take place at a higher security level do not affect actions that take place at a lower level?A .  The Bell-LaPadula modelB .  The information flow modelC .  The noninterference modelD .  The Clark-Wilson modelView AnswerAnswer: C Explanation: The goal of a noninterference...

February 24, 2019 No Comments READ MORE +

In an organization, an Information Technology security function should:

In an organization, an Information Technology security function should:A .  Be a function within the information systems function of an organization.B .  Report directly to a specialized business unit such as legal, corporate security or insurance.C .  Be lead by a Chief Security Officer and report directly to the CEE...

February 24, 2019 No Comments READ MORE +

To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:

To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:A .  Access RulesB .  Access MatrixC .  Identification controlsD .  Access terminalView AnswerAnswer: A Explanation: Controlling access by a subject (an active entity such...

February 24, 2019 No Comments READ MORE +

Almost all types of detection permit a system's sensitivity to be increased or decreased during an inspection process. If the system's sensitivity is increased, such as in a biometric authentication system, the system becomes increasingly selective and has the possibility of generating:

Almost all types of detection permit a system's sensitivity to be increased or decreased during an inspection process. If the system's sensitivity is increased, such as in a biometric authentication system, the system becomes increasingly selective and has the possibility of generating:A .  Lower False Rejection Rate (FRR)B .  Higher...

February 23, 2019 No Comments READ MORE +

What is called a sequence of characters that is usually longer than the allotted number for a password?

What is called a sequence of characters that is usually longer than the allotted number for a password?A .  passphraseB .  cognitive phraseC .  anticipated phraseD .  Real phraseView AnswerAnswer: A Explanation: A passphrase is a sequence of characters that is usually longer than the allotted number for a password....

February 22, 2019 No Comments READ MORE +

Which of the following rules is least likely to support the concept of least privilege?

Which of the following rules is least likely to support the concept of least privilege?A .  The number of administrative accounts should be kept to a minimum.B .  Administrators should use regular accounts when performing routine operations like reading mail.C .  Permissions on tools that are likely to be used...

February 20, 2019 No Comments READ MORE +

How can an individual/person best be identified or authenticated to prevent local masquarading attacks?

How can an individual/person best be identified or authenticated to prevent local masquarading attacks?A .  UserId and passwordB .  Smart card and PIN codeC .  Two-factor authenticationD .  BiometricsView AnswerAnswer: D Explanation: The only way to be truly positive in authenticating identity for access is to base the authentication on...

February 19, 2019 No Comments READ MORE +

Access Control techniques do not include which of the following?

Access Control techniques do not include which of the following?A .  Rule-Based Access ControlsB .  Role-Based Access ControlC .  Mandatory Access ControlD .  Random Number Based Access ControlView AnswerAnswer: D Explanation: Access Control Techniques Discretionary Access Control Mandatory Access Control Lattice Based Access Control Rule-Based Access Control Role-Based Access Control...

February 19, 2019 No Comments READ MORE +

Which one of the following factors is NOT one on which Authentication is based?

Which one of the following factors is NOT one on which Authentication is based?A .  Type 1. Something you know, such as a PIN or passwordB .  Type 2. Something you have, such as an ATM card or smart cardC .  Type 3. Something you are (based upon one or...

February 19, 2019 No Comments READ MORE +