Ch 11- Self Test Flashcards
Which best practice configures host computers so that they are not vulnerable to attack?
A. Vulnerability Assessment
B. Penetration test
C. Hardening
D. PKI
Which type of test simulates a network attack?
A. Vulnerability assessment
B. Establishing an attack baseline
C. Hardening
D. Penetration test
You have been asked to harden a crucial network router. What should you do? (Choose 2)
A. Disable the routing of IPv6 packets
B. Change the default administrative password
C. Apply firmware patches
D. Configure the router for SSO
You are invited to join an IT meeting where the merits and pitfalls of cloud computing are being debated. Your manager conveys her concerns of data confidentiality for cloud storage. What can be done to secure data stored in the cloud?
A. Encrypt the data
B. Digitally sign the data
C. Use a stream cipher
D. Change default passwords
Which of the following works best to encrypt variable-length data?
A. Block cipher
B. Symmetric cipher
C. Asymmetric cipher
D. Stream cipher
With PKI, which key is used to validate a digital signature?
A. Private key
B. Public key
C. Secret key
D. Signing key
Which of the following is related to nonrepudiation?
A. Block cipher
B. PKI
C. Symmetric encryption
D. Stream cipher
Sean configures a web application to allow content managers to upload files to the website. What type of access control model is Sean using?
A. DAC
B. MAC
C. RBAC
You are the administrator of a Windows network. When creating a new user account, you specify a security clearance of top secret so that the user can access classified files. What type of access control method is being used?
A. DAC
B. MAC
C. RBAC
True of False. DAC is suitable for large organizations.
A. True
B. False