欢迎来到天天文库
浏览记录
ID:12418832
大小:54.00 KB
页数:9页
时间:2018-07-17
《cissp访问控制问题》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、AccessControl1.Whichofthefollowingisnotusedinbiometricsystemstoauthenticateindividuals?A.FingerprintingB.KeyboarddynamicsC.IrisScanD.Cognitivepassword2.Whichofthefollowingistheostimportantwhenevaluatingdifferentbiometricsystems?A.TypeIerrorB.CERC.TypeIIer
2、rorD.ThetotalamountoferrorsbetweenTypeIandTypeII3.Whichofthefollowingattacksismostcommonlyusedtouncoverpasswords?A.SpoofingB.DictionaryattackC.DoSD.WinNuke4.WhichofthefollowingisnotaweaknessofKerberos?A.TheKDCisasinglepointoffailureB.Kerberosisvulnerablet
3、opasswordguessingC.AlldevicesmusthaveKerberossoftwaretoparticipateD.Kerberosisthedefactostandardfordistributednetworks5.Acapabilitytableisboundtowhichofthefollowing?A.SubjectB.ObjectC.ACLsD.Permissions6.Whichofthefollowingbestdescribesthedifferencebetween
4、memoryandsmartcards?A.Amemorycardhasmicroprocessorandintegratedcircuitsusedtoprocessdata,whereasasmartcardhasamagneticstripthatisusedtoholdinformationB.Asmartcardhasamicroprocessorandintegratedcircuitsusedtoprocessdata,whereasamemorycardhasamagneticstript
5、hatisusedtoholdinformationC.MemorycardsaremoretamperproofthansmartcardsD.Memorycardsarecheapertodevelop,create,andmaintain7.Whichofthefollowingisatruestatementpertainingtointrusiondetectionsystems?A.Signature-basedsystemscandetectnewattacktypesA.Signature
6、-basedsystemscausemorefalsepositivesthanbehavior-basedsystemsB.Behavior-basedsystemsmaintainadatabaseofpatternstomatchpacketsandattacksagainstC.Behavior-basedsystemshavehigherfalsepositivesthansignature-basedsystems2.Whichofthefollowingisacountermeasureto
7、trafficanalysisattacks?A.ControlzoneB.KeystrokemonitoringC.WhitenoiseD.Trafficpadding3.Ifseveralsubjectsaccessthesamemediaormemorysegments,sensitivedatamaybeatriskofbeinguncovered.Thisisreferredtoas:A.DegaussingB.ZeroizationC.ObjectreuseD.Mandatoryaccess4
8、.Whichofthefollowingisnotanexampleofcentralizedaccesscontroladministrationtechnology?A.RADIUSB.TEMPESTC.TACACSD.DiameterAnswersof1to101.D.2.B.3.B.4.B.5.A.6.B.7.D.8.D.9.C.10.B5.Thethreeclassicwaysofauthenticatingyour
此文档下载收益归作者所有