欢迎来到天天文库
浏览记录
ID:13391116
大小:54.00 KB
页数:9页
时间:2018-07-22
《cissp访问控制问题》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、AccessControl1.Whichofthefollowingisnotusedinbiometricsystemstoauthenticateindividuals?A.FingerprintingB.KeyboarddynamicsC.IrisScanD.Cognitivepassword2.Whichofthefollowingistheostimportantwhenevaluatingdifferentbiometricsystems?A.TypeIerrorB.CERC.TypeIIerrorD.ThetotalamountoferrorsbetweenTypeIa
2、ndTypeII3.Whichofthefollowingattacksismostcommonlyusedtouncoverpasswords?A.SpoofingB.DictionaryattackC.DoSD.WinNuke4.WhichofthefollowingisnotaweaknessofKerberos?A.TheKDCisasinglepointoffailureB.KerberosisvulnerabletopasswordguessingC.AlldevicesmusthaveKerberossoftwaretoparticipateD.Kerberosisth
3、edefactostandardfordistributednetworks5.Acapabilitytableisboundtowhichofthefollowing?A.SubjectB.ObjectC.ACLsD.Permissions6.Whichofthefollowingbestdescribesthedifferencebetweenmemoryandsmartcards?A.Amemorycardhasmicroprocessorandintegratedcircuitsusedtoprocessdata,whereasasmartcardhasamagneticst
4、ripthatisusedtoholdinformationB.Asmartcardhasamicroprocessorandintegratedcircuitsusedtoprocessdata,whereasamemorycardhasamagneticstripthatisusedtoholdinformationC.MemorycardsaremoretamperproofthansmartcardsD.Memorycardsarecheapertodevelop,create,andmaintain7.Whichofthefollowingisatruestatementp
5、ertainingtointrusiondetectionsystems?A.Signature-basedsystemscandetectnewattacktypesA.Signature-basedsystemscausemorefalsepositivesthanbehavior-basedsystemsB.Behavior-basedsystemsmaintainadatabaseofpatternstomatchpacketsandattacksagainstC.Behavior-basedsystemshavehigherfalsepositivesthansignatu
6、re-basedsystems2.Whichofthefollowingisacountermeasuretotrafficanalysisattacks?A.ControlzoneB.KeystrokemonitoringC.WhitenoiseD.Trafficpadding3.Ifseveralsubjectsaccessthesamemediaormemorysegments,sensitivedatamaybeatriskofbeinguncovered.Thisisreferredtoas:A.DegaussingB.ZeroizationC.ObjectreuseD.M
7、andatoryaccess4.Whichofthefollowingisnotanexampleofcentralizedaccesscontroladministrationtechnology?A.RADIUSB.TEMPESTC.TACACSD.DiameterAnswersof1to101.D.2.B.3.B.4.B.5.A.6.B.7.D.8.D.9.C.10.B5.Thethreeclassicwaysofauthenticatingyour
此文档下载收益归作者所有