CISSP访问控制习题讲解

advertisement
1 Which of the following is NOT an advantage password
syncronization has over single sign-on?
A higher cost
B less intrusive
C improved security
D lower cost
每时每刻
可信安全
A
2 Which of the following biometric devices offers the lowest
CER?
A Keystroke dynamics
B Voice verification
C Iris scan
D Fingerprint
C
每时每刻
可信安全
3 How can an individual best be authenticated?
A UserId and password
B Smart card and PIN code
C Two-factor authentication
D Biometrics
D
每时每刻
可信安全
4 Passwords can be required to change monthly, quarterly, or at
other intervals:
A depending on the criticality of the information needing protection
B depending on the criticality of the information needing protection
and the password's frequency of use.
C depending on the password's frequency of use.
D not depending on the criticality of the information needing
protection but depending on the password's frequency of use
B
每时每刻
可信安全
5 The measures that also apply to areas that are used for
storage of the backup data files are:
A Preventive/physical
B Preventive/administrative
C Preventive/technical
D Detective/administrative
A
每时每刻
可信安全
6 Which authentication technique best protects against
hijacking?
A Static authentication
B Continuous authentication
C Robust authentication
D Strong authentication
B
每时每刻
可信安全
7 There are parallels between the trust models in Kerberos
and in PKI. When we compare them side by side,
Kerberos tickets correspond most closely to which of the
following?
A public keys
B private keys
C public-key certificates
D private-key certificates
C
每时每刻
可信安全
8 Which of the following can best eliminate dial-up access
through a Remote Access Server as a hacking vector?
A Using a TACACS+ server.
B Installing the Remote Access Server outside the firewall and
forcing legitimate users to authenticate to the firewall.
C Setting modem ring count to at least 5.
D Only attaching modems to non-networked hosts
B
每时每刻
可信安全
9 Organizations should consider which of the following first
before connecting their LANs to the Internet?
A plan for implementing workstation locking mechanisms
B plan for protecting the modem pool
C plan for providing the user with his account usage
information
D plan for considering all authentication options
每时每刻
可信安全
D
10 Which of the following is required in order to provide
accountability?
A Authentication
B Integrity
C Confidentiality
D Audit trails
A
每时每刻
可信安全
11 Which of the following does not apply to systemgenerated passwords?
A Passwords are harder to remember for users.
B If the password-generating algorithm gets to be known,
the entire system is in jeopardy.
C Passwords are more vulnerable to brute force and
dictionary attacks.
D Passwords are harder to guess for attackers
C
每时每刻
可信安全
12 Which of the following control pairing places emphasis
on "soft" mechanisms that support the access control
objectives?
A Preventive/Technical Pairing
B Preventive/Administrative Pairing
C Preventive/Physical Pairing
D Detective/Administrative Pairing
B
每时每刻
可信安全
13 Which of the following is true of biometrics?
A It is used for identification in physical controls and it is
not used in logical controls.
B It is used for authentication in physical controls and for
identification in logical controls.
C It is used for identification in physical controls and for
authentication in logical controls.
D Biometrics has not role in logical controls
C
每时每刻
可信安全
14 In biometrics, "one-to-many" search against database of
stored biometric images is done in:
A Authentication
B Identification
C Identities
D Identity-based access control
B
每时每刻
可信安全
15 Which of the following statements pertaining to
Kerberos is true?
A Kerberos uses public key cryptography.
B Kerberos uses X.509 certificates.
C Kerberos is a credential-based authentication system.
D Kerberos was developed by Microsoft
C
每时每刻
可信安全
16 What is called a key pad which has only a small
number of keys that can be selected by the user?
A IBM keypads
B 84 key Keypad
C Limited Keypads
D 101 keys Keypads
C
每时每刻
可信安全
17 Which of the following biometrics devices has the
highest Crossover Error Rate (CER)?
A Iris scan
B Hand geometry
C Voice pattern
D Fingerprints
C
每时每刻
可信安全
18 Which of the following biometric parameters are better
suited for authentication use over a long period of time?
A Iris pattern
B Voice pattern
C Signature dynamics
D Retina pattern
A
每时每刻
可信安全
19 Which of the following is used by RADIUS for
communication between clients and servers?
A TCP
B SSL
C UDP
D SSH
C
每时每刻
可信安全
20 Why should batch files and scripts be stored in a
protected area?
A Because of the least privilege concept.
B Because they cannot be accessed by operators.
C Because they may contain credentials.
D Because of the need-to-know concept
C
每时每刻
可信安全
21 A potential problem with an iris pattern biometric system
is:
A concern that the laser beam may cause eye damage.
B the iris pattern changes as a person grows older.
C there is a relatively high rate of false accepts.
D the optical unit must be positioned so that the sun does
not shine into the aperture
A
每时每刻
可信安全
22 In biometric identification systems, false accept rate is
associated with:
A Type 2 errors
B type 1 and type 2 errors
C type 3 errors
D type 1 errors
A
每时每刻
可信安全
23 Ensuring least privilege does not require:
A Identifying what the user's job is.
B Ensuring that the user alone does not have sufficient
rights to subvert an important process.
C Determining the minimum set of privileges required for a
user to perform their duties.
D Restricting the user to required privileges and nothing
more
B
每时每刻
可信安全
24 Which of the following is not a complement to an
Intrusion Detection System (IDS)?
A Honey pots
B Firewalls
C Padded cells
D File integrity checkers
每时每刻
可信安全
B
25 The throughput rate is the rate at which individuals,
once enrolled, can be processed and identified or
authenticated by a system. Acceptable throughput
rates are in the range of:
A 100 subjects per minute.
B 25 subjects per minute.
C 10 subjects per minute.
D 50 subjects per minute
C
C
每时每刻
可信安全
26 What is the primary goal of setting up a honeypot?
A To lure hackers into attacking unused systems
B To entrap and track down possible hackers
C To set up a sacrificial lamb on the network
D To know when an attack is in progress and to learn
about attack techniques so the network can be fortified.
D
每时每刻
可信安全
27 Which of the following is the least accepted biometric
device?
A Fingerprint
B Iris scan
C Retina scan
D Voice verification
C
每时每刻
可信安全
28 Which of the following usually provides reliable, realtime information without consuming network or host
resources?
A network-based IDS
B host-based IDS
C application-based IDS
D firewall-based IDS
A
每时每刻
可信安全
29 Which of the following is a trusted, third party
authentication protocol that was developed under Project
Athena at MIT?
A Kerberos
B SESAME
C KryptoKnight
D NetSP
A
每时每刻
可信安全
30 Which of following is not a service provided by AAA
servers (Radius, TACACS and DIAMETER)?
A Authentication
B Administration
C Accounting
D Authorization
B
每时每刻
可信安全
31 The Terminal Access Controller Access Control System
(TACACS) employs which of the following?
A a user ID and static password for network access.
B a user ID and dynamic password for network access.
C a user ID and symmetric password for network access.
D a user ID and asymmetric password for network access
A
每时每刻
可信安全
32 How are memory cards and smart cards different?
A Memory cards normally hold more memory than smart
cards
B Smart cards provide a two-factor authentication whereas
memory cards don't
C Memory cards have no processing power
D Only smart cards can be used for ATM cards
C
每时每刻
可信安全
33 Which type of control would password management
classify as?
A Compensating control
B Detective control
C Preventive control
D Technical control
C
每时每刻
可信安全
34 Why would anomaly detection IDSs often generate a
large number of false positives?
A Because they can only identify correctly attacks they
already know about.
B Because they are application-based are more subject to
attacks.
C Because they can't identify abnormal behavior.
D Because normal patterns of user and system behavior
can vary wildly.
D
每时每刻
可信安全
35 Which of the following control pairing best describe
logical controls or technical controls?
A Preventive/Administrative
B Preventive/Technical
C Preventive/Physical
D Detective/Administrative
B
每时每刻
可信安全
36 A host-based IDS is resident on which of the following?
A centralized hosts
B decentralized hosts
C certified hosts
D bastion hosts
A
每时每刻
可信安全
Download