260. Intrusion detection refers to the process of identifying attempts to penetrate a computer system and gain unauthorized access. Which of the following assists in intrusion detection?
a.
Audit recordsb.
Access control listsc.
Security clearancesd.
Host-based authenticationAccess control lists refer to a register of users who have been given permission to use a particular system resource and the types of access they have been permitted. Security clearances are associated with a subject (e.g., person and program) to access an object (e.g., files, libraries, directories, and devices). Host-based authentication grants access based upon the identity of the host originating the request, instead of the identity of the user making the request. The other three choices have no facilities to record access activity and therefore cannot assist in intrusion detection.
261. Which of the following is the technique used in anomaly detection in intrusion detection systems where user and system behaviors are expressed in terms of counts?
a.
Parametric statisticsb.
Threshold detection measuresc.
Rule-based measuresd.
Nonparametric statisticsStatistical measures include parametric and nonparametric. In parametric measures the distribution of the profiled attributes is assumed to fit a particular pattern. In the nonparametric measures the distribution of the profiled attributes is “learned” from a set of historical data values, observed over time.
Rule-based measures are similar to nonparametric statistical measures in that observed data defines acceptable usage patterns but differs in that those patterns are specified as rules, not numeric quantities.
262. Which of the following is
a.
Iris-detection technologyb.
Voice technologyc.
Hand technologyd.
Fingerprint technology263. Which of the following is true about biometrics?
a.
Least expensive and least secureb.
Most expensive and least securec.
Most expensive and most secured.
Least expensive and most secure264. Which of the following is preferable for environments at high risk of identity spoofing?
a.
Digital signatureb.
One-time passwordsc.
Digital certificated.
Mutual authentication265. Which of the following is