|
Question 1. Who is responsible for establishing access permissions to network resources in the DAC access control model? A. The system administrator. B. The owner of the resource. C. The system administrator and the owner of the resource. D. The user requiring access to the resource. Answer: B Question 2. Why do security researchers often use virtual machines? A. To offer an environment where new network applications can be tested B. To offer a secure virtual environment to conduct online deployments C. To offer a virtual collaboration environment to discuss security research D. To offer an environment where malware can be executed with minimal risk to equipment and software Answer: D Question 3. Which access control system allows the system administrator to establish access permissions to network resources? A. MAC B. DAC C. RBAC D. None of the above. Answer: A Question 4. You work as a network administrator for your company. Taking personal safety into consideration, what fire suppression substances types can effectively prevent damage to electronic equipment? A. Halon B. CO C. Water D. Foam Answer: B Question 5. Which of the following access control models uses roles to determine access permissions? A. MAC B. DAC C. RBAC D. None of the above. Answer: C Question 6. Given: John is a network administrator. He advises the server administrator of his company to implement whitelisting, blacklisting, closing-open relays and strong authentication techniques. Question: Which threat is being addressed? A. Viruses B. Adware C. Spam D. Spyware Answer: C Question 7. Most current encryption schemes are based on A. digital rights management B. time stamps C. randomizing D. algorithms Answer: D Question 8. Study the following items carefully, which one will permit a user to float a domain registration for a maximum of five days? A. Spoofing B. DNS poisoning C. Domain hijacking D. Kiting Answer: D Question 9. Which of the following types of cryptography is typically used to provide an integrity check? A. Public key B. Asymmetric C. Symmetric D. Hash Answer: D Question 10. The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates. The public key infrastructure is based on which encryption schemes? A. Symmetric B. Quantum C. Asymmetric D. Elliptical curve Answer: C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.