What is the difference between a session and a permanent cookie?
What is the difference between a session and a permanent cookie?
What type of technology does Joe need toimplement for this type of functionality?
Joe is a manager over the e-commerce capabilities and technologies within hiscompany. His boss has recently told him that the company is going to partner withanother company and that customer entitlements need to be able to transparentlytransverse the different networks. What type of technology does Joe need toimplement for this type of functionality?
Which of the following biometric technologies is considered the most accurate?
Which of the following biometric technologies is considered the most accurate?
Which of the following has the correct definition mapping?
Which of the following has the correct definition mapping?
i.Brute force attacks Performed with tools that cycle through many possiblecharacter, number, and symbol combinations to uncover a password.
ii. Dictionary attacks Files of thousands of words are compared to the user’spassword until a match is found.
iii. Social engineering An attacker falsely convinces an individual that she has thenecessary authorization to access specific resources.
iv. Rainbow table An attacker uses a table that contains all possible passwordsalready in a hash format.
Whatsolution should he offer his team to implement?
Joe is the manager of the network administration group. He has been told thatone of the systems working in dedicated security mode has been configured to allowsensitive information to pass to a system working in multilevel security mode. Whatsolution should he offer his team to implement?
Which of the following should Bob choseto implement?
Bob needs to implement role-based access control (RBAC) within his company. Hehas learned that there are several approaches to RBAC. He needs to ensure that usersPage 2cess trol-P5.txtare mapped to multiple roles and mapped directly to other types of applications thatdo not have role-based access functionality. Which of the following should Bob choseto implement?
What type of access control does this refer to?
Dan is a senior manager within the security department of his company. He needsto make a purchasing decision of the type of access control products that should beimplemented. The product that is purchased needs to ensure that managers can accessa portion of a file or folder, but not others. What type of access control does this refer to?
Which of the following is a correct definition mapping?
Which of the following is a correct definition mapping?
i.DAC Data owners decide who has access to resources, and ACLs are used to enforcethe security policy.
ii. MAC Operating systems enforce the system’s security policy through the use ofsecurity labels.
iii. RBAC Access decisions are based on each subject’s role and/or functionalposition.
Which of the following describes the discrepancies in the following statement?
Which of the following describes the discrepancies in the following statement?"a TCP connection, the sender sends an SYN packet, the receiver sends an ACK, andthen the sender acknowledges that packet with an ACK packet."
Which of the following are used in an attack detected by an IDS?
Which of the following are used in an attack detected by an IDS?