Reference no: EM132205712
1-Formal models are most useful in situations where the confidentiality of the information decreases over time.
True
False
2-Pick the false statement.
Because routers perform only a basic function, they are not vulnerable to attack.
Routers inspect where information is going and sometimes from where it has come.
Security devices installed on a router inspect IP addresses.
A router is a device used to direct traffic throughout the network.
3-Which of the following are integrity models. (Choose all that apply):
GPS mapping of access locations.
Requiring digital signatures on documents.
Use of Hamming Codes.
Closing unused ports on network devices.
4-Once a standard listening port is turned off, all the code that is used to run it is automatically deleted.
True
False
5-Which of the following is NOT a goal of minimization?
• To provide servers, services and network protocols in a manageable defense architecture.
• To produce a wide variety of policy rules.
• To reduce the cognitive complexity of the system for the defender.
• To present the smallest possible attack surface to an adversary
6- Match the term to its definition.
Access control list (ACL)
Access control matrix
Verification
Confidentiality model
a. Specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
b. An abstract formal security model of protection state in computer systems that characterizes the rights of each subject with respect to every object in the system.
c. Process of checking information to establish the truth of the claimed fact.
d. Models that establish access limits based upon clearance and confidentiality levels.
7-Which one of the following is an advantage of mathematical models:
Mathematical models permit infinite complexity.
Mathematical models are clear and unambiguous.
Mathematical models can address every predictable human variation and situation.
Mathematical models are static and do not need revision over time.
8- A host's defense against an exploiter's asymmetric advantage includes which of the following (Choose all that apply):
Defenders choose what systems to run.
Defenders choose how to connect systems.
Defenders generally maintain the default settings on vendor devices.
Defenders choose which policies to implement.
9-Intrusion Prevention System (IPS)
is a frustration strategy.
is a detection strategy.
is a recognition strategy.
Uses data less restrictively and thus less expensively than Intrusion Detection Systems (IDSs).
10-Integrity models are NOT useful for which ONE of the following:
• Determining whether data has been corrupted in transmission.
• Determining whether unauthorized changes have been made to data.
• Assigning access controls to users for authorization to review and change data.
• Protecting confidential information from cross-contamination.