Tag: technology

Questions Related to technology

Which of the following requires that a user or process be granted access to only those resources necessary to perform assigned functions.

  1. Discretionary access control

  2. Separation of duties

  3. Least privilege

  4. Rotation of duties


Correct Option: C

AI Explanation

To answer this question, you need to understand the concept of access control and the principle of least privilege.

Option A) Discretionary access control - This option is incorrect because discretionary access control refers to a security model where users have control over their own resources and can grant or restrict access to those resources. It does not specifically address the principle of granting access to only necessary resources.

Option B) Separation of duties - This option is incorrect because separation of duties refers to the practice of dividing responsibilities among multiple users to prevent fraud or errors. While it can help with access control, it does not specifically address granting access to only necessary resources.

Option C) Least privilege - This option is correct because the principle of least privilege states that a user or process should only be granted access to the resources necessary to perform their assigned functions. By adhering to this principle, organizations can minimize the potential damage caused by unauthorized access or misuse of resources.

Option D) Rotation of duties - This option is incorrect because rotation of duties refers to the practice of periodically changing job assignments to prevent fraud or errors. It is not directly related to granting access to only necessary resources.

The correct answer is C) Least privilege. This option is correct because it aligns with the principle of granting access to only those resources necessary to perform assigned functions.

In mandatory access control, the system controls access and the owner determines:

  1. Validation

  2. Need to know

  3. Consensus

  4. Verification


Correct Option: B
  1. Revoking credentials

  2. Encryption

  3. Communications

  4. Placement


Correct Option: A

A disadvantage of single sign-on is:

  1. Consistent time-out enforcement across platforms

  2. A compromised password exposes all authorized resources

  3. Use of multiple passwords to remember

  4. Password change control


Correct Option: B

AI Explanation

To answer this question, let's go through each option to understand why it is correct or incorrect:

Option A) Consistent time-out enforcement across platforms - This option is incorrect. Single sign-on (SSO) allows users to authenticate once and access multiple applications or systems without requiring them to log in again. It does not affect the time-out enforcement across platforms.

Option B) A compromised password exposes all authorized resources - This option is correct. One of the disadvantages of single sign-on is that if a user's password is compromised, it can potentially expose all the authorized resources that the user has access to. Since SSO allows users to use a single set of credentials to access multiple systems, a compromised password could grant unauthorized access to multiple resources.

Option C) Use of multiple passwords to remember - This option is incorrect. Single sign-on actually reduces the need for users to remember multiple passwords. With SSO, users only need to remember a single set of credentials to access multiple systems.

Option D) Password change control - This option is incorrect. Single sign-on does not directly affect password change control. Password change control is typically managed by an organization's password policy and can be implemented regardless of whether SSO is used or not.

The correct answer is B) A compromised password exposes all authorized resources. This option is correct because it highlights one of the disadvantages of single sign-on, which is the potential risk of a compromised password granting unauthorized access to multiple resources.

Availability makes information accessible by protecting from each of the following except:

  1. Denial of services

  2. Fires, floods, and hurricanes

  3. Unreadable backup tapes

  4. Unauthorized transactions


Correct Option: D

AI Explanation

To answer this question, you need to understand the concept of availability and how it relates to information security.

Option A) Denial of services - This option is incorrect because availability helps protect against denial of services. Denial of services refers to the intentional disruption or prevention of access to a system or network, making it unavailable to users. Availability measures, such as redundancy and load balancing, are implemented to ensure continuous access to information despite denial of service attacks.

Option B) Fires, floods, and hurricanes - This option is incorrect because availability helps protect against natural disasters. Fires, floods, and hurricanes can cause physical damage to infrastructure and equipment, leading to the loss of data and system downtime. Availability measures, such as offsite backups and disaster recovery plans, are implemented to ensure that information remains accessible even in the face of such events.

Option C) Unreadable backup tapes - This option is incorrect because availability helps protect against the loss of readable backup tapes. Backup tapes are used to store copies of data for recovery purposes. If the backup tapes become unreadable due to errors or damage, the information may not be accessible when needed. Availability measures, such as regular testing and verification of backups, are implemented to ensure the integrity and accessibility of backup data.

Option D) Unauthorized transactions - This option is correct because availability does not directly protect against unauthorized transactions. Unauthorized transactions refer to unauthorized access or manipulation of data or systems, typically for financial gain or malicious purposes. Availability focuses on ensuring the continuous availability and accessibility of information, rather than specifically protecting against unauthorized transactions.

The correct answer is D) Unauthorized transactions. This option is correct because availability measures do not directly address protecting against unauthorized transactions. Other security measures, such as authentication, authorization, and encryption, are implemented to prevent unauthorized access and transactions.

  1. Encryption of data

  2. Access controls

  3. Nonrepudiation

  4. Steganography


Correct Option: D
  1. Protection of the private key

  2. Distribution of the shared key

  3. Integrity of the message

  4. History of session keys


Correct Option: A
  1. Encrypting the message with the receiver's public key

  2. Encrypting a hash of the message

  3. Having the message authenticated by a certificate authority

  4. Using a password-protected file format


Correct Option: A
  1. Send a digital signature of the message to the recipient

  2. Encrypt the message with a symmetric algorithm and send it

  3. Encrypt the message with a private key so the recipient can decrypt with the corresponding public key

  4. Send an encrypted hash of the message along with the message to the recipient


Correct Option: D

The two methods of encrypting data are

  1. Substitution and transposition

  2. Block and stream

  3. Symmetric and asymmetric

  4. DES and AES


Correct Option: B