which of the following should be carried out?
To properly enforce access control within environment, which of the following should be carried out?
i.Deny access to systems by undefined users or anonymous accounts.
ii. Allow unlimited usage of administrator and other powerful accounts.
iii. Suspend or delay access capability after a specific number of unsuccessful logon attempts.
iv. Remove obsolete user accounts as soon as the user leaves the company.
v. Activate inactive accounts after 30 to 60 days.
which one is something that intrusion detection (ID) and response is not?
Of the following choices, which one is something that intrusion detection (ID) and response is not?
How are access control lists (ACLs) and capability tables different?
How are access control lists (ACLs) and capability tables different?
which would be the best password?
Of the following choices, which would be the best password?
Which of the following issues deal with reassigning to a subject media that previously contained one or more o
Which of the following issues deal with reassigning to a subject media that previously contained one or more objects?
who granted the authorization. This is an example of:
The XYZ company was attacked by an entity who was authorized to access system resources but who used them in a way not approved by those who granted the authorization. This is an example of:
what actions individual subjects can take upon individual objects is called a:
A table of subjects and objects indicating what actions individual subjects can take upon individual objects is called a:
This type of access protection system is called a:
One way to limit connections to a system is by calling back the number of a previously authorized location. This type of access protection system is called a:
Which of the following are correct characteristics of anomaly-based IDSes?
Which of the following are correct characteristics of anomaly-based IDSes?
i.Pattern matching
ii. Stateful matching
iii. Protocol anomaly-based
iv. Traffic anomaly-based
v.Rule or Heuristic – based
which best ensures user accountability for actions taken within a system or domain?
Of the following choices, which best ensures user accountability for actions taken within a system or domain?