1. What are often the primary safeguards for systems software and data?
A) Administrative access controls B) Logical access controls C) Physical access controls D) Detective access controls
2. Which of the following is often used as a detection and deterrent control against Internet attacks?
A) Honeypots B) CCTV C) VPN D) VLAN
3. Which of the following BEST characterizes a mantrap or deadman door, which is used as a deterrent control for the vulnerability of piggybacking?
A) A monitored double-doorway entry system B) A monitored turnstile entry system C) A monitored doorway entry system D) A one-way door that does not allow exit after entry
4. Which of the following is an effective method for controlling downloading of files via FTP?
A) An application-layer gateway, or proxy firewall, but not stateful inspection firewalls B) An application-layer gateway, or proxy firewall C) A circuit-level gateway D) A first-generation packet-filtering firewall
5. Which of the following provides the strongest authentication for physical access control?
A) Sign-in logs B) Dynamic passwords C) Key verification D) Biometrics
1. Right Answer: B Explanation: Logical access controls are often the primary safeguards for systems software and datA.
2. Right Answer: A Explanation: Honeypots are often used as a detection and deterrent control against Internet attacks.
3. Right Answer: A Explanation: A monitored double-doorway entry system, also referred to as a mantrap or deadman door, is used a deterrent control for the vulnerability of piggybacking.
4. Right Answer: B Explanation: Application-layer gateways, or proxy firewalls, are an effective method for controlling downloading of files via FTP. Because FTP is an OSI application-layer protocol, the most effective firewall needs to be capable of inspecting through the application layer.
5. Right Answer: D Explanation: Biometrics can be used to provide excellent physical access control.
Leave a comment