271. Out-of-band attacks against electronic authentication protocols include which of the following?
1.
Password guessing attack2.
Replay attack3.
Verifier impersonation attack4.
Man-in-the-middle attacka.
1 onlyb.
3 onlyc.
1 and 2d.
3 and 4In an out-of-band attack, the attacker alters the authentication protocol channel through session hijacking, verifier impersonation, or man-in-the-middle (MitM) attacks. In a verifier impersonation attack, the attacker impersonates the verifier and induces the claimant to reveal his secret token. The MitM attack is an attack on the authentication protocol run in which the attacker positions himself in between the claimant and verifier so that he can intercept and alter data traveling between them.
In a password guessing attack, an impostor attempts to guess a password in repeated logon trials and succeeds when he can log onto a system. In a replay attack, an attacker records and replays some part of a previous good protocol run to the verifier. Both password guessing and replay attacks are examples of in-band attacks. In an in-band attack, the attack is against an authentication protocol where the attacker assumes the role of a claimant with a genuine verifier or actively alters the authentication channel. The goal of the attack is to gain authenticated access or learn authentication secrets.
272. Which of the following information security control families requires a cross-cutting approach?
a.
Access controlb.
Audit and accountabilityc.
Awareness and trainingd.
Configuration management273. Confidentiality controls include which of the following?
a.
Cryptographyb.
Passwordsc.
Tokensd.
Biometrics274. Which of the following is
a.
Logical access controlsb.
Role-based access controlsc.
Reconstruction of transactionsd.
System privileges275. Which of the following is
a.
Performance-based policyb.
Identity-based policyc.
Role-based policyd.
Rule-based policy276. From security and safety viewpoints, which of the following does
a.
Mutually exclusive rolesb.
Reduced chances of collusionc.
Conflict-of-interest in tasksd.
Implicit constraints277. Which of the following are compatible with each other in the pair in performing similar functions in information security?
a.
SSO and RSOb.
DES and DNSc.
ARP and PPPd.
SLIP and SKIP