89. Which of the following user actions are permitted without identification or authentication?
1.
Access to public websites2.
Emergency situations3.
Unsuccessful login attempts4.
Reestablishing a session locka.
1 onlyb.
2 onlyc.
1 and 2d.
3 and 490. Which of the following circumstances require additional security protections for mobile devices after unsuccessful login attempts?
a.
When a mobile device requires a login to itself, and not a user account on the deviceb.
When a mobile device is accessing a removable media without a loginc.
When information on the mobile device is encryptedd.
When the login is made to any one account on the mobile device91. An information system dynamically reconfigures with which of the following as information is created and combined?
a.
Security attributes and data structuresb.
Security attributes and security policiesc.
Security attributes and information objectsd.
Security attributes and security labels91.b. An information system dynamically reconfigures security attributes in accordance with an identified security policy as information is created and combined. The system supports and maintains the binding of security attributes to information in storage, in process, and in transmission. The term security label is often used to associate a set of security attributes with a specific information object as part of the data structures (e.g., records, buffers, and files) for that object.
92. For identity management, international standards do
1.
Discretionary access control (DAC)2.
Mandatory access control (MAC)3.
Identity-based access control (IBAC)4.
Rule-based access control (RuBAC)a.
1 and 2b.
1 and 3c.
2 and 3d.
3 and 493. Which of the following is an example of less than secure networking protocols for remote access sessions?
a.
Secure shell-2b.
Virtual private network with blocking mode enabledc.
Bulk encryptiond.
Peer-to-peer networking protocols94. For wireless access, in which of the following ways does an organization confine wireless communications to organization-controlled boundaries?
1.
Reducing the power of the wireless transmission and controlling wireless emanations2.
Configuring the wireless access path such that it is point-to-point in nature3.
Using mutual authentication protocols4.
Scanning for unauthorized wireless access points and connectionsa.
1 onlyb.
3 onlyc.
2 and 4d.
1, 2, 3, and 4