194. For major functions of intrusion detection and prevention system technologies, which of the following statements are true?
1.
It is not possible to eliminate all false positives and false negatives.2.
Reducing false positives increases false negatives and vice versa.3.
Decreasing false negatives is always preferred.4.
More analysis is needed to differentiate false positives from false negatives.a.
1 onlyb.
2 onlyc.
3 onlyd.
1, 2, 3, and 4195. Which of the following authentication techniques is impossible to forge?
a.
What the user knowsb.
What the user hasc.
What the user isd.
Where the user isGeodetic location, as calculated from a location signature, adds a fourth and new dimension to user authentication and access control mechanisms. The signature is derived from the user’s location. It can be used to determine whether a user is attempting to log in from an approved location. If unauthorized activity is detected from an authorized location, it can facilitate finding the user responsible for that activity.
196. How does a rule-based access control mechanism work?
a.
It is based on filtering rules.b.
It is based on identity rules.c.
It is based on access rules.d.
It is based on business rules.197. Which of the following is an example of a system integrity tool used in the technical security control category?
a.
Auditingb.
Restore to secure statec.
Proof-of-wholenessd.
Intrusion detection toolAuditing is a detective control, which enables monitoring and tracking of system abnormalities. “Restore to secure state” is a recovery control that enables a system to return to a state that is known to be secure, after a security breach occurs. Intrusion detection tools detect security breaches.
198. Individual accountability does
a.
Unique identifiersb.
Access rulesc.
Audit trailsd.
Policies and proceduresThe concept of individual accountability drives the need for many security safeguards, such as unique (user) identifiers, audit trails, and access authorization rules. Policies and procedures indicate what to accomplish and how to accomplish objectives. By themselves, they do not exact individual accountability.
199. From an access control viewpoint, which of the following is computed from a passphrase?
a.
Access passwordb.
Personal passwordc.
Valid passwordd.
Virtual password199.d. A virtual password is a password computed from a passphrase that meets the requirements of password storage (e.g., 56 bits for DES). A passphrase is a sequence of characters, longer than the acceptable length of a regular password, which is transformed by a password system into a virtual password of acceptable length.