Methodology and Systems Prep Test


1. 

General purpose control types include all the following except:

  1. Detective

  2. Mandatory

  3. Preventive

  4. Compensating

image from book

2. 

Violation reports and audit trails are examples of what type of control?

  1. Detective technical

  2. Preventive technical

  3. Detective administrative

  4. Preventive administrative

image from book

3. 

“A user cannot deny an action” describes the concept of

  1. Authentication

  2. Accountability

  3. Non-repudiation

  4. Plausible deniability

image from book

4. 

Authentication can be based on any combination of the following factors except

  1. Something you know

  2. Something you have

  3. Something you need

  4. Something you are

image from book

5. 

Unauthorized users that are incorrectly granted access in biometric systems are described as the

  1. False Reject Rate (Type II error)

  2. False Accept Rate (Type II error)

  3. False Reject Rate (Type I error)

  4. False Accept Rate (Type I error)

image from book

6. 

All the following devices and protocols can be used to implement one-time passwords except

  1. Tokens

  2. S/Key

  3. Diameter

  4. Kerberos

image from book

7. 

Which of the following PPP authentication protocols transmits passwords in clear text?

  1. PAP

  2. CHAP

  3. MS-CHAP

  4. FTP

image from book

8. 

Which of the following is not considered a method of attack against access control systems?

  1. Brute force

  2. Dictionary

  3. Denial of service

  4. Buffer overflow

image from book

9. 

Sensitivity labels are a fundamental component in which type of access control systems?

  1. Mandatory access control

  2. Discretionary access control

  3. Access control lists

  4. Role-based access control

image from book

10. 

Which of the following access control models addresses availability issues?

  1. Bell-LaPadula

  2. Biba

  3. Clark-Wilson

  4. None of the above

image from book

Answers

1. 

B. Mandatory. Control types identified by purpose include preventive, detective, corrective, deterrent, recovery, and compensating controls. Review “Control types.”

2. 

A. Detective technical. Preventive technical controls include access control mechanisms and protocols. Review of audit trails is a detective administrative control, but the actual generating of audit trails is a technical function (control). Review “Technical controls.”

3. 

C. Non-repudiation. Authentication and accountability are related to but aren’t the same as non-repudiation. Plausible deniability is a bogus answer. Review “Accountability.”

4. 

C. Something you need.The three factors of authentication are something you know, something you have, and something you are. Review “System access controls.”

5. 

B. False Accept Rate (Type II error).You should know the biometric error types by both descriptions.The False Reject Rate is aType I error and describes the percentage of authorized users that are incorrectly denied access. Review
“Biometrics and behavior.”

6. 

D. Kerberos. Kerberos is a ticket-based authentication protocol. Although the tickets that are generated are unique for every logon, Kerberos relies on shared secrets that are static.Therefore, Kerberos isn’t considered a one-time password protocol. Review these three sections: “One-time passwords,” “Tokens,” and “Single sign-on (SSO).”

7. 

A. PAP.The Password Authentication Protocol (PAP) transmits passwords in clear text. CHAP and MS-CHAP authenticate using challenges and responses that are calculated, using a one-way hash function. FTP transmits passwords in clear text but isn’t a PPP authentication protocol. Review “Centralized access controls.”

8. 

C. Denial of service.The purpose of an attack against access controls is to gain access to a system. Brute force and dictionary attacks are both password cracking methods. Although commonly used in denial of service attacks, a buffer overflow attack can exploit vulnerabilities or flaws in certain applications and protocols that will allow unauthorized access. Review “Methods of attack.”

9. 

A. Mandatory access control.The fundamental components in discretionary access controls are file (and data) ownership and access rights and permissions. Access control lists and role-based access control are types of discretionary access control systems. Review “Access control techniques.”

10. 

D. None of the above. Bell-LaPadula addresses confidentiality issues. Biba and Clark-Wilson address integrity issues. Review “Access control models.”




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net