1.
The Computer Security Policy Model the Orange Book is based on is which of the following?
2.
The end result of implementing the principle of least privilege means which of the following?
3.
Which of the following is the most reliable authentication method for remote access?
4.
Which of the following is the most reliable, secure means of removing data from magnetic storage media such as a magnetic tape, or a cassette?
5.
The Orange Book is founded upon which security policy model?
6.
Which of the following is true of two-factor authentication?
7.
The primary service provided by Kerberos is which of the following?
8.
There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side, Kerberos tickets correspond most closely to which of the following?
9.
Which of the following is NOT a system-sensing wireless proximity card?
10.
Which of the following is NOT a type of motion detector?