⟩ A(n) _______________ is an abstract machine, which mediates all access subjects have to objects. A. ACL B. Reference monitor C. State machine D. TCB E. Router?
B. Reference monitor
B. Reference monitor
Virtual corporations typically use a(n) _______ for maintaining centralized information assets. A. Off-line repository B. Floppy disk C. Data warehouse D. CD-ROM burner E. Colocation?
Which of the following is an example of a simple, physical-access control? A. Lock B. Access control list C. Background check D. Token E. Firewall?
A _______ attack uses multiple systems to launch a coordinated attack. A. Distributed denial-of-service B. Teardrop C. Birthday D. FTP Bounce E. Salami?
Explain Which encryption algorithm has the highest bit strength? A. AES B. Blowfish C. DES D. CAST E. Triple DES?
____________________ educate(s) security administrators and end users about organizations security policies. A. Security-awareness training B. Information Security (INFOSEC) briefings C. Acceptable-use policies D. Continuing education E. Nondisclosure agreements?
Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target operating system. A. Sequence Verifier B. Initial sequence number C. Address spoofing D. Time to Live E. IP ID field?
Embedding symbols in images or common items, such as pictures or quilts, is an example of __________. A. Espionage B. Transposition cipher C. Key exchange D. Arithmancy E. Steganography?
A(n) _______________ is an unintended communication path that can be used to violate a system security policy. A. Covert channel B. Integrity axiom C. Simple rule violation D. Inferred fact?
Organizations _______ risk, when they convince another entity to assume the risk for them. A. Elevate B. Assume C. Deny D. Transfer E. Mitigate?
Explain Which browser-based configuration device can be used to monitor and manage multiple Cisco PIX Security Appliance? A. Cisco PIX Device Manager B. Cisco ASA Device Manager C. Firewall Management Center D. PIX Management Center