277. a.
A single sign-on (SSO) technology allows a user to authenticate once and then access all the resources the user is authorized to use. A reduced sign-on (RSO) technology allows a user to authenticate once and then access many, but not all, of the resources the user is authorized to use. Hence, SSO and RSO perform similar functions.The other three choices do not perform similar functions. Data encryption standard (DES) is a symmetric cipher encryption algorithm. Domain name system (DNS) provides an Internet translation service that resolves domain names to Internet Protocol (IP) addresses and vice versa. Address resolution protocol (ARP) is used to obtain a node’s physical address. Point-to-point protocol (PPP) is a data-link framing protocol used to frame data packets on point-to-point lines. Serial line Internet protocol (SLIP) carries Internet Protocol (IP) over an asynchronous serial communication line. PPP replaced SLIP. Simple key management for Internet protocol (SKIP) is designed to work with the IPsec and operates at the network layer of the TCP/IP protocol, and works very well with sessionless datagram protocols.
278. How is identification different from authentication?
a.
Identification comes after authentication.b.
Identification requires a password, and authentication requires a user ID.c.
Identification and authentication are the same.d.
Identification comes before authentication.279. Accountability is
a.
Identificationb.
Availabilityc.
Authenticationd.
Auditing280. Which of the following statements is true about mandatory access control?
a.
It does not use sensitivity levels.b.
It uses tags.c.
It does not use security labels.d.
It reduces system performance.281. What control is referred to when an auditor reviews access controls and logs?
a.
Directive controlb.
Preventive controlc.
Corrective controld.
Detective control282. Logical access controls are a technical means of implementing security policy decisions. It requires balancing the often-competing interests. Which of the following trade-offs should receive the highest interest?
a.
User-friendlinessb.
Security principlesc.
Operational requirementsd.
Technical constraints283. Which of the following types of passwords is counterproductive?
a.
System-generated passwordsb.
Encrypted passwordsc.
Nonreusable passwordsd.
Time-based passwords