1.
Controls to keep password sniffing attacks from compromising computer systems include which of the following?
2.
Kerberos can prevent which one of the following attacks?
3.
In discretionary access environments, which of the following entities is authorized to grant information access to other people?
4.
What is the main concern with single sign-on?
5.
Who developed one of the first mathematical models of a multilevel-security computer system?
6.
A department manager has read access to the salaries of the employees in his/her department but not to the salaries of employees in other departments. A database security mechanism that enforces this policy would typically be said to provide which of the following?
7.
Which of the following attacks could capture network user passwords?
8.
Which of the following would constitute the best example of a password to use for access to a system by a network administrator?
9.
The number of violations that will be accepted or forgiven before a violation record is produced is called which of the following?
10.
Examples of types of physical access controls include all EXCEPT which of the following?