Give us your feedback!
Question:
Clark-Wilson focuses primarily on:
Response:
Availability
Accessibility
Authentication
Address Integrity
Confidentialty
Which access control includes job rotation?
Technical
Organizational
Administrative
Physical
A WAN is
the Westinghouse Address Naming convention
a Working Authentication Name
one of the Wilson-Adder Need types
a Wide Area Network
a Wide Array Node
Match the following examples to their definitions
Unpatched servers
Vulnerability
A virus that relies on unpatched code or OS levels
Threat
The likelihood a threat will be realized, the frequency of natural disasters
Risk
$1M dollars per day downtime
Exposure
A proxy server
Countermeasure
In MAC the access policy is set by:
the GPO
the system
the role
the owner
network ACL
Bell-La Padula focuses primarily on:
Data Integrity
Account administration, policies and standards, asset classification and reviews of audit trails are all examples of
Administrative controls
Both technical and administrative controls
Physical controls
Technical controls
Owner-set permissions are an example of:
mandatory access control
Clark-Wilson
role-based access control
Discretionary access control
Which of the following packet switched networks is best suited for fiber optic networks with sporadic traffic?
Frame Relay
ATM
SMDS
MPLS
SONET
Work factor is defined as:
the amount of effort/time required by an algorithm to fully encrypt or decrypt a message
the amount of effort/time required by an attacker to overcome a protective measure
the amount of effort/time required by an administrator to establish a reasonable system security plan
the amount of effort/time required to maintain an established security plan once it has been implemented
Which access control requires sensitivity labels on all subjects and objects?
Access List Control
Role-based access control
Manager set control
Mandatory access control
Which of the following is the highest in the OSI model:
Data Link
Network
Presentation
Transport
Which of the following have the best CER?
Hand scanning
Iris Scanning
Badge Scanning
Finger scanning
Which access control includes cameras?
Visual
"The strength of the cryptosystem is a function of the keys, not the algorithm" is also known as
Moore's Law
Rijndael's Challenge
Kerckhoff's Principle
Diffe-Hillman's Axiom