Which of the following is not one of the three goals of Integrity addressed by the Clark-Wilson model?
APrevention of the modification of information by unauthorized users.
BPrevention of the unauthorized or unintentional modification of information by authorized users.
CPreservation of the internal and external consistency.
DPrevention of the modification of information by authorized users.
What would BEST define a covert channel?
AAn undocumented backdoor that has been left by a programmer in an operating system
BAn open system port that should be closed.
CA communication channel that allows transfer of information in a manner that violates the system's security policy.
DA trojan horse.
Which of the following statements pertaining to protection rings is false?
AThey provide strict boundaries and definitions on what the processes that work within each ring can access.
BPrograms operating in inner rings are usually referred to as existing in a privileged mode.
CThey support the CIA triad requirements of multitasking operating systems.
DThey provide users with a direct access to peripherals D
An Intrusion Detection System (IDS) is what type of control?
AA preventive control.
BA detective control.
CA recovery control.
DA directive control.
Which of the following should NOT be performed by an operator?
AImplementing the initial program load
BMonitoring execution of the system
CData entry
DControlling job flow
Which of the following is less likely to be included in the change control sub-phase of the maintenance phase of a software product?
AEstimating the cost of the changes requested
BRecreating and analyzing the problem
CDetermining the interface that is presented to the user
DEstablishing the priorities of requests
In the days before CIDR (Classless Internet Domain Routing), networks were commonly organized by classes. Which of the following would have been true of a
Class B network?
AThe first bit of the IP address would be set to zero.
BThe first bit of the IP address would be set to one and the second bit set to zero.
CThe first two bits of the IP address would be set to one, and the third bit set to zero.
DThe first three bits of the IP address would be set to one.
Which of the following phases of a software development life cycle normally incorporates the security specifications, determines access controls, and evaluates encryption options?
ADetailed design
BImplementation
CProduct design
DSoftware plans and requirements
Secure Shell (SSH-2) supports authentication, compression, confidentiality, and integrity, SSH is commonly used as a secure alternative to all of the following protocols below except:
Atelnet
Brlogin
CRSH
DHTTPS
Which of the following IEEE standards defines the token ring media access method?
A802.3
B802.11
C802.5
D802.2
Communications and network security relates to transmission of which of the following?
Avoice
Bvoice and multimedia
Cdata and multimedia
Dvoice, data and multimedia
Which of the following is NOT true concerning Application Control?
AIt limits end users use of applications in such a way that only particular screens are visible.
BOnly specific records can be requested through the application controls
CParticular usage of the application can be recorded for audit purposes
DIt is non-transparent to the endpoint applications so changes are needed to the applications and databases involved
External consistency ensures that the data stored in the database is:
Ain-consistent with the real world.
Bremains consistant when sent from one system to another.
Cconsistent with the logical world.
Dconsistent with the real world.
Which of the following security modes of operation involves the highest risk?
ACompartmented Security Mode
BMultilevel Security Mode
CSystem-High Security Mode
DDedicated Security Mode
When first analyzing an intrusion that has just been detected and confirming that it is a true positive, which of the following actions should be done as a first step if you wish to prosecute the attacker in court?
ABack up the compromised systems.
BIdentify the attacks used to gain access.
CCapture and record system information.
DIsolate the compromised systems.
The number of violations that will be accepted or forgiven before a violation record is produced is called which of the following?
Aclipping level
Bacceptance level
Cforgiveness level
Dlogging level
Examples of types of physical access controls include all EXCEPT which of the following?
Abadges
Blocks
Cguards
Dpasswords
Which of the following is addressed by Kerberos?
AConfidentiality and Integrity
BAuthentication and Availability
CValidation and Integrity
DAuditability and Integrity
Which of the following classes is the first level (lower) defined in the TCSEC (Orange Book) as mandatory protection?
AB
BA
CC
DD
What are called user interfaces that limit the functions that can be selected by a user?
AConstrained user interfaces
BLimited user interfaces
CMini user interfaces
DUnlimited user interfaces
What is called an automated means of identifying or authenticating the identity of a living person based on physiological or behavioral characteristics?
ABiometrics
BMicrometrics
CMacrometrics
DMicroBiometrics
Which of the following is implemented through scripts or smart agents that replays the users multiple log-ins against authentication servers to verify a user's identity which permit access to system services?
ASingle Sign-On
BDynamic Sign-On
CSmart cards
DKerberos
Which of the following is a trusted, third party authentication protocol that was developed under Project Athena at MIT?
AKerberos
BSESAME
CKryptoKnight
DNetSP
Which of the following biometric devices offers the LOWEST CER?
AKeystroke dynamics
BVoice verification
CIris scan
DFingerprint
A central authority determines what subjects can have access to certain objects based on the organizational security policy is called: