1. Which of the following is a guiding best practice for implementing logical access controls?
A) Implementing the Biba Integrity Model B) Access is granted on a least-privilege basis, per the organization's data owners C) Implementing the Take-Grant access control model D) Classifying data according to the subject's requirements
2. What does PKI use to provide some of the strongest overall control over data confidentiality, reliability, and integrity for Internet transactions?
A) A combination of public-key cryptography and digital certificates and two-factor authentication B) A combination of public-key cryptography and two-factor authentication C) A combination of public-key cryptography and digital certificates D) A combination of digital certificates and two-factor authentication
3. Which of the following do digital signatures provide?
A) Authentication and integrity of data B) Authentication and confidentiality of data C) Confidentiality and integrity of data D) Authentication and availability of data
4. Regarding digital signature implementation, which of the following answers is correct?
A) A digital signature is created by the sender to prove message integrity by encrypting the message with the sender's private key. Upon receiving the data, the recipient can decrypt the data using the sender's public key. B) A digital signature is created by the sender to prove message integrity by encrypting the message with the recipient's public key. Upon receiving the data, the recipient can decrypt the data using the recipient's public key. C) A digital signature is created by the sender to prove message integrity by initially using a hashing algorithm to produce a hash value or message digest from the entire message contents. Upon receiving the data, the recipient can independently create it. D) A digital signature is created by the sender to prove message integrity by encrypting the message with the sender's public key. Upon receiving the data, the recipient can decrypt the data using the recipient's private key.
5. Which of the following would provide the highest degree of server access control?
A) A mantrap-monitored entryway to the server room B) Host-based intrusion detection combined with CCTV C) Network-based intrusion detection D) A fingerprint scanner facilitating biometric access control
1. Right Answer: B Explanation: Logical access controls should be reviewed to ensure that access is granted on a least-privilege basis, per the organization's data owners.
2. Right Answer: C Explanation: PKI uses a combination of public-key cryptography and digital certificates to provide some of the strongest overall control over data confidentiality, reliability, and integrity for Internet transactions.
3. Right Answer: A Explanation: The primary purpose of digital signatures is to provide authentication and integrity of data.
4. Right Answer: C Explanation: A digital signature is created by the sender to prove message integrity by initially using a hashing algorithm to produce a hash value, or message digest, from the entire message contents. Upon receiving the data, the recipient can independently create its own message digest from the data for comparison and data integrity validation. Public and private are used to enforce confidentiality. Hashing algorithms are used to enforce integrity.
5. Right Answer: D Explanation: A fingerprint scanner facilitating biometric access control can provide a very high degree of server access control.
Leave a comment