This is an example of which type of access-control method?
ABC Corporation’s network requires users to authenticate to cross the border firewall, and before entering restricted segments. Servers containing sensitive information require separate authentication. This is an example of which type of access-control method?
Which controls of the items listed below…
The items listed below are examples of ___________________ controls.
*Smart cards
*Access control lists
*Authentication servers
*Auditing
Which of the following is the BEST method for managing users in an enterprise?
Which of the following is the BEST method for managing users in an enterprise?
Which educate(s) security administrators and end users about organizations’ security policies.
____________________ educate(s) security administrators and end users about organizations’ security policies.
Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target operating sys
Operating-system fingerprinting uses all of the following, EXCEPT ________, to identify a target operating system.
What organizations risk when they convince another entity to assume the risk for them.
Organizations _______ risk, when they convince another entity to assume the risk for them.
Distinguish between the role of the data owner and the role of the data custodian
Distinguish between the role of the data owner and the role of the data custodian. Complete the following sentence. The data owner is the:
Does this solution adhere to the secure design principle of open design?
You are considering purchasing a VPN solution to protect your organization’s information assets. The solution you are reviewing uses RFC-compliant and open-standards encryption schemes. The vendor has submitted the system to a variety of recognized testing authorities. The vendor does not make the source code available to testing authorities. Does this solution adhere to the secure design principle of open design?
Why should each system user and administrator have individual accounts?
Why should each system user and administrator have individual accounts? (Choose TWO.)
Which occurs when intrusion-detection measures fail to recognize suspicious traffic or activity.
A(n) _______ occurs when intrusion-detection measures fail to recognize suspicious traffic or activity.