Genius

Authentication, encryption, and ACLs

Authentication, encryption, and ACLs



1. Which of the following is NOT an authentication protocol:
a. Lightweight Directory Authentication Protocol
b. Diameter
c. RADIUS
d. Lightweight Directory Access Protocol


2. An intruder wishes to break in to an application in order to steal
information stored there. Because the application utilizes strong
authentication, what is the most likely approach the intruder will take?
a. Dictionary attack
b. Malicious code attack
c. Application bypass attack
d. Password guessing attack


3. Authentication, encryption, and ACLs are examples of:
a. Defense in depth
b. Detective controls
c. Administrative controls
d. Technical controls


4. The categories of controls are:
a. Detective, deterrent, preventive, corrective, recovery, and
compensating
b. Detective, preventive, and deterrent
c. Technical, logical, and physical
d. Detective, preventive, recovery, and compensating


5. Video surveillance is an example of what type(s) of control:
a. Detective and deterrent
b. Detective only
c. Deterrent only
d. Preventive






Computer Science Assignment Help, Computer Science Homework help, Computer Science Study Help, Computer Science Course Help
Answered
Other / Other
21 Mar 2016

Answers (1)

  1. Genius

    Authentication, encryption, and ACLs

    Authentication, encryption, and ACLs ****** ******
    To see full answer buy this answer.
    Answer Attachments

    1 attachments —

    • img
      9254166.docx

Report As Dispute

Share Your Feedback

Give Review : A+ A B C D F