IPsec transport mode
Give this one a try later!
can be used between two endpoints.
How can an equivalent to RBAC be implemented in a DAC operating system?
A Assign users classification labels.
B Create groups with the names of jobs, assign privileges to the groups, and place
users into named groups.
C Assign users job labels.
D Use filter lists to control access, set time restrictions, and block access based on
logical address.
,Give this one a try later!
B. To create an equivalent role-based access control (RBAC) solution in a
discretionary access control (DAC) operating system, an administrator
should create groups with the names of jobs, assign privileges to the
groups, and then place users into named groups. Thus, users will be
members of job role named groups and inherit the privileges assigned to
that group. This will result in users being able to perform their work tasks
assigned to them. This is the same result as in a true RBAC system where a
job label is created, privileges are assigned to the label, and then the label
is assigned to or placed onto a user.
Answer C is incorrect. Assigning job labels is just RBAC, not an equivalent
of RBAC in DAC. Furthermore, DAC does not offer job labels, only access
control via access control lists (ACLs) on objects.
Answer A is incorrect. Mandatory access control (MAC) uses the assigning
of classification labels. RBAC and DAC do not use classification labels.
Answer D is incorrect. Filter lists, time restrictions, and logical address
control are all valid means of access control, just not relevant to this
scenario.
What is the primary benefit of a security camera for physical security?
A Detective
B Corrective
C Directive
D Preventative
Give this one a try later!
, A. The primary benefit of a security camera for physical security is
detective. A security camera is a recording device and is a physical activity
auditing system. Anything that takes place in view of a camera can be
recorded. Thus, the camera serves as a detective security mechanism for
physical security. A security camera can also be considered a deterrent as
well.
Answer C is incorrect. A security camera does not provide directive
security control. A directive control gives instruction on how to act or
behave, such as a sign, policy, or verbal statement from a security guard.
Answer D is incorrect. A security camera does not provide preventative
security control. A preventative control attempts to stop a violation from
occurring, such as locks on doors, mantraps, and turnstiles.
Answer B is incorrect. A security camera does not provide corrective
security control. A corrective control attempts to restore a mechanism back
to its desired, normal, and secure state. Examples include a spring on a
door, a daylight sensor on a light, and a security guard who can lock a
door.
What must every policy possess in order to be successfully implemented?
A Senior executive endorsement
B Scope and statements from stakeholders
C An enforcement provision
D Controls and procedures statement
Give this one a try later!
A. The policy will be doomed to failure if it does not have senior executive
endorsement or a mandate from senior management.
Which was originally programmed for UNIX systems by Massachusetts Institute of
Technology (MIT)?
, A Single sign-on
B Kerberos
C Federated access
D Centralized authentication
Give this one a try later!
B
What is a security procedure?
A Specific criteria that must be met by implementation
B Suggested practices
C Detailed steps for performing specific tasks
D Minimum hardware and software requirements
Give this one a try later!
Give this one a try later!
can be used between two endpoints.
How can an equivalent to RBAC be implemented in a DAC operating system?
A Assign users classification labels.
B Create groups with the names of jobs, assign privileges to the groups, and place
users into named groups.
C Assign users job labels.
D Use filter lists to control access, set time restrictions, and block access based on
logical address.
,Give this one a try later!
B. To create an equivalent role-based access control (RBAC) solution in a
discretionary access control (DAC) operating system, an administrator
should create groups with the names of jobs, assign privileges to the
groups, and then place users into named groups. Thus, users will be
members of job role named groups and inherit the privileges assigned to
that group. This will result in users being able to perform their work tasks
assigned to them. This is the same result as in a true RBAC system where a
job label is created, privileges are assigned to the label, and then the label
is assigned to or placed onto a user.
Answer C is incorrect. Assigning job labels is just RBAC, not an equivalent
of RBAC in DAC. Furthermore, DAC does not offer job labels, only access
control via access control lists (ACLs) on objects.
Answer A is incorrect. Mandatory access control (MAC) uses the assigning
of classification labels. RBAC and DAC do not use classification labels.
Answer D is incorrect. Filter lists, time restrictions, and logical address
control are all valid means of access control, just not relevant to this
scenario.
What is the primary benefit of a security camera for physical security?
A Detective
B Corrective
C Directive
D Preventative
Give this one a try later!
, A. The primary benefit of a security camera for physical security is
detective. A security camera is a recording device and is a physical activity
auditing system. Anything that takes place in view of a camera can be
recorded. Thus, the camera serves as a detective security mechanism for
physical security. A security camera can also be considered a deterrent as
well.
Answer C is incorrect. A security camera does not provide directive
security control. A directive control gives instruction on how to act or
behave, such as a sign, policy, or verbal statement from a security guard.
Answer D is incorrect. A security camera does not provide preventative
security control. A preventative control attempts to stop a violation from
occurring, such as locks on doors, mantraps, and turnstiles.
Answer B is incorrect. A security camera does not provide corrective
security control. A corrective control attempts to restore a mechanism back
to its desired, normal, and secure state. Examples include a spring on a
door, a daylight sensor on a light, and a security guard who can lock a
door.
What must every policy possess in order to be successfully implemented?
A Senior executive endorsement
B Scope and statements from stakeholders
C An enforcement provision
D Controls and procedures statement
Give this one a try later!
A. The policy will be doomed to failure if it does not have senior executive
endorsement or a mandate from senior management.
Which was originally programmed for UNIX systems by Massachusetts Institute of
Technology (MIT)?
, A Single sign-on
B Kerberos
C Federated access
D Centralized authentication
Give this one a try later!
B
What is a security procedure?
A Specific criteria that must be met by implementation
B Suggested practices
C Detailed steps for performing specific tasks
D Minimum hardware and software requirements
Give this one a try later!