243. Passwords can be stored safely in which of the following places?
a.
Initialization fileb.
Script filec.
Password filed.
Batch file244. Which of the following is
a.
Password sharingb.
Password guessingc.
Password capturingd.
Password spoofingThe other three choices are incorrect because they are the most commonly used methods to gain unauthorized access to computer systems. Password sharing allows an unauthorized user to have the system access and privileges of a legitimate user, with the legitimate user’s knowledge and acceptance. Password guessing occurs when easy-to-use or easy-to-remember codes are used and when other users know about them (e.g., hobbies, sports, favorite stars, and social events). Password capturing is a process in which a legitimate user unknowingly reveals the user’s login ID and password. This may be done through the use of a Trojan horse program that appears to the user as a legitimate login program; however, the Trojan horse program is designed to capture passwords.
245. What are the Bell-LaPadula access control model and mandatory access control policy examples of?
a.
Identity-based access controls (IBAC)b.
Attribute-based access controls (ABAC)c.
Role-based access controls (RBAC)d.
Rule-based access controls (RuBAC)246. Which of the following security solutions for access control is simple to use and easy to administer?
a.
Passwordsb.
Cryptographic tokensc.
Hardware keysd.
Encrypted data filesPasswords is an incorrect answer because they do require some amount of security administrative work such as setting up the account and helping users when they forget passwords. Passwords are simple to use but hard to administer.
Cryptographic tokens is an incorrect answer because they do require some amount of security administrative work. Tokens need to be assigned, programmed, tracked, and disposed of.
Encrypted data files is an incorrect answer because they do require some amount of security administrative work. Encryption keys need to be assigned to the owners for encryption and decryption purposes.
247. Cryptographic authentication systems must specify how the cryptographic algorithms will be used. Which of the following authentication systems would reduce the risk of impersonation in an environment of networked computer systems?
a.
Kerberos-based authentication systemb.
Password-based authentication systemc.
Memory token-based authentication systemd.
Smart token-based authentication system