Tag: security

Questions Related to security

Files temporarily created by applications can expose confidential data if:

  1. Special characters are not used in the filename to keep the file hidden

  2. The existence of the file exceeds three seconds

  3. File permissions are not set appropriately

  4. Special characters indicating this is a system file are not used in the filename


Correct Option: C
Explanation:

To solve this question, the user needs to understand the concept of file security and how confidential data can be exposed.

Option A is incorrect because using special characters in the filename does not necessarily keep the file hidden or secure. The filename is just a label for the file and does not affect the file's contents or accessibility.

Option B is incorrect because the amount of time the file exists does not determine the file's security. Even temporary files can contain confidential data, and it is essential to ensure that they are adequately secured.

Option D is also incorrect because using special characters in the filename does not necessarily indicate that the file is a system file or secure. The filename is just a label and does not affect the file's contents or accessibility.

Option C is correct because file permissions play a crucial role in determining who can access or modify a file. If the permissions are not set appropriately, anyone can access the file, including unauthorized users, resulting in confidential data exposure.

Therefore, the answer is: C.

  1. Increased stability as the programs are protected against viral attack

  2. Enhanced reliability as users can no longer modify source code

  3. Reduced breaches of policy due to disclosure of information

  4. Possible denial of service if the keys are corrupted


Correct Option: D
Explanation:

To solve this question, the user needs to know about the advantages and disadvantages of integrating cryptography into applications.

Option A is incorrect because it states cryptography brings increased stability as the programs are protected against viral attack. Cryptography can help protect against viral attacks to some extent, but it does not guarantee increased stability.

Option B is incorrect because it states that cryptography enhances reliability since users can no longer modify source code. This is not true as cryptography does not prevent users from modifying source code, but rather it helps protect sensitive data.

Option C is also incorrect because it states that cryptography reduces breaches of policy due to disclosure of information. Cryptography can help protect against data breaches but does not prevent them entirely.

Option D is the correct answer because possible denial of service (DoS) attacks can occur if the keys used for cryptography are corrupted. Once the keys are corrupted, the system will be unable to decrypt messages, which can lead to a DoS attack.

Therefore, the correct answer is:

The Answer is: D. Possible denial of service if the keys are corrupted

  1. Workstations

  2. Servers

  3. Switches

  4. Database management systems


Correct Option: C

The correlation of system time among network components is important for what purpose?

  1. Availability

  2. Network connectivity

  3. Backups

  4. Audit log review


Correct Option: D

AI Explanation

To answer this question, you need to understand the concept of system time correlation and its importance in different aspects of network management.

Option A) Availability - This option is incorrect. System time correlation is not directly related to the availability of network components. Availability refers to the ability of network components to be accessible and operational.

Option B) Network connectivity - This option is incorrect. System time correlation does not directly affect network connectivity. Network connectivity refers to the ability of network components to establish and maintain connections with each other.

Option C) Backups - This option is incorrect. System time correlation is not directly tied to the process of backups. Backups refer to the creation and storage of copies of data or configurations for the purpose of recovery in case of data loss or system failure.

Option D) Audit log review - This option is correct. System time correlation is important for the purpose of audit log review. Audit logs are records of activities and events that occur within a network. By correlating system time across different network components, it becomes easier to review and analyze audit logs to identify any suspicious or unauthorized activities.

The correct answer is D) Audit log review. This option is correct because system time correlation is crucial for accurately reviewing and analyzing audit logs to ensure network security and detect any potential security breaches.

Which group characteristic or practice should be avoided?

  1. Account groupings based on duties

  2. Group accounts

  3. Distribution of privileges to members of the group

  4. Assigning an account to multiple groups


Correct Option: B
  1. Ordinary users

  2. Security administrators

  3. System administrators

  4. None of the above


Correct Option: D
  1. Wireless Encryption Protocol (WEP)

  2. Wired Equivalent Privacy (WEP)

  3. Wi-Fi Protected Access (WPA)

  4. Wireless Protected Access (WPA)


Correct Option: C