Access Control11Word格式.docx

上传人:b****6 文档编号:16128542 上传时间:2022-11-20 格式:DOCX 页数:80 大小:69KB
下载 相关 举报
Access Control11Word格式.docx_第1页
第1页 / 共80页
Access Control11Word格式.docx_第2页
第2页 / 共80页
Access Control11Word格式.docx_第3页
第3页 / 共80页
Access Control11Word格式.docx_第4页
第4页 / 共80页
Access Control11Word格式.docx_第5页
第5页 / 共80页
点击查看更多>>
下载资源
资源描述

Access Control11Word格式.docx

《Access Control11Word格式.docx》由会员分享,可在线阅读,更多相关《Access Control11Word格式.docx(80页珍藏版)》请在冰豆网上搜索。

Access Control11Word格式.docx

4/5|Relevancy:

3/3

ThereareparallelsbetweenthetrustmodelsinKerberosandinPKI.Whenwecomparethemsidebyside,Kerberosticketscorrespondmostcloselytowhichofthefollowing?

publickeys

privatekeys

o

public-keycertificates

private-keycertificates

C.AKerberosticketisissuedbyatrustedthirdparty;

itisanencrypteddatastructurethatincludestheserviceencryptionkey.Inthatsenseitissimilartoapublic-keycertificate.However,theticketisnotakey.Andthereisnosuchthingasaprivatekeycertificate.

Studyareas:

CISSPCBKdomain#1-AccessControl,CISSPCBKdomain#5-Cryptography

Coveredtopics

(2):

Kerberos,X.509Digitalcertificates

Thisquestion©

Copyright2003–2006cccure.org.

2.Question:

423|Difficulty:

1/5|Relevancy:

Whatiscalledapasswordthatisthesameforeachlog-onsession?

"

one-timepassword"

two-timepassword"

staticpassword

dynamicpassword

C.Apasswordthatisthesameforeachlog-oniscalledastaticpassword.

Source:

KRUTZ,RonaldL.&

VINES,RusselD.,TheCISSPPrepGuide:

MasteringtheTenDomainsofComputerSecurity,2001,JohnWiley&

Sons,Page36.

Contributor:

RakeshSud

Studyarea:

CISSPCBKdomain#1-AccessControl

Coveredtopic:

Passwords

Copyright2003–2006RakeshSud,cccure.org.

3.Question:

88|Difficulty:

Atimelyreviewofsystemaccessauditrecordswouldbeanexampleofwhichofthebasicsecurityfunctions?

avoidance.

deterrence.

prevention.

detection.

D.Thecorrectansweris:

Byreviewingsystemlogsyoucandetecteventsthathaveoccured.

Thefollowinganswersareincorrect:

avoidance.Thisisincorrect,avoidanceisadistractor.Byreviewingsystemlogsyouhavenotavoidedanything.

deterrence.Thisisincorrectbecausesystemlogsareahistoryofpastevents.Youcannotdetersomethingthathasalreadyoccurred.

prevention.Thisisincorrectbecausesystemlogsareahistoryofpastevents.Youcannotpreventsomethingthathasalreadyoccurred.

Lastmodified6/08/2007-J.Hajec

Comment:

Atimelyreviewoftheauditlogswouldprovideearlydetectionofpossibleandintentionalabusesbutdoesnothingtopreventoccurrenceofabuses,ifany.Anearlydetectionwouldleadtopreventionofmuchseriousabuseslateron.Auditingcanbeseenasadetectionexercisemorethanapreventiveexercise.

References:

OIGCBKGlossary(page791)

KamrenLee

Account,logandjournalmonitoring

4.Question:

1241|Difficulty:

2/5|Relevancy:

Identificationandauthenticationarethekeystonesofmostaccesscontrolsystems.Identificationestablishes:

useraccountabilityfortheactionsonthesystem.

topmanagementaccountabilityfortheactionsonthesystem.

EDPdepartmentaccountabilityfortheactionsofusersonthesystem.

authenticationforactionsonthesystem

A.Identificationandauthenticationarethekeystonesofmostaccesscontrolsystems.Identificationestablishesuseraccountabilityfortheactionsonthesystem.

Contributors:

RakeshSud,SasaVidanovic

Accesscontrolobjectives

5.Question:

438|Difficulty:

Whichofthefollowingbiometriccharacteristicscannotbeusedtouniquelyauthenticateanindividual'

sidentity?

Retinascans

Irisscans

Palmscans

Skinscans

D.Thefollowingaretypicalbiometriccharacteristicsthatareusedtouniquelyauthenticateanindividual'

sidentity:

-Fingerprints

-Retinascans

-Irisscans

-Facialscans

-Palmscans

-Handgeometry

-Voice

-Handwrittensignaturedynamics

Sons,Page39.

And:

HARRIS,Shon,All-In-OneCISSPCertificationExamGuide,McGraw-Hill/Osborne,2002,chapter4:

AccessControl(pages127-131).

RakeshSud,ChristianVezina,donmurdoch

Biometrics

6.Question:

408|Difficulty:

Whatiscalledtheaccessprotectionsystemthatlimitsconnectionsbycallingbackthenumberofapreviouslyauthorizedlo

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 求职职场 > 社交礼仪

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1