1.
Choose the terminology or concept which best describes a (Mandatory Access Control) model.
2.
Password cracking tools are available worldwide over the Internet. Which one of the following items is a password cracking tool?
3.
Which authentication method does the following sequence: Logon request, encrypts value response, server, challenge, compare encrypts results, authorize or fail referred to?
4.
IDS is short for Intrusion Detection Systems. Which option is the MOST basic form of IDS?
5.
Which of the following statements is TRUE regarding the Security Token system?
6.
Which statement is true about the cryptographic algorithm employed by TLS to establish a session key?
7.
To aid in preventing the execution of malicious code in email clients, which of the following should be done by the email administrator?
8.
Which of the following access control models uses roles to determine access permissions?
9.
Which of the following types of publicly accessible servers should have anonymous logins disabled to prevent an attacker from transferring malicious data?
10.
Which practice can best code applications in a secure manner?