300. What is a control to prevent an unauthorized user from starting an alternative operating system?
a.
Shadow passwordb.
Encryption passwordc.
Power-on passwordd.
Network password301. The concept of least privilege is based on which of the following?
a.
Risk assessmentb.
Information flow enforcementc.
Access enforcementd.
Account management302. Which of the following is the primary technique used by commercially available intrusion detection and prevention systems (IDPS) to analyze events to detect attacks?
a.
Signature-based IDPSb.
Anomaly-based IDPSc.
Behavior-based IDPSd.
Statistical-based IDPS303. For electronic authentication, which of the following is an example of a passive attack?
a.
Eavesdroppingb.
Man-in-the-middlec.
Impersonationd.
Session hijackingA man-in-the-middle (MitM) attack is incorrect because it is an active attack on the authentication protocol run in which the attacker positions himself between the claimant and verifier so that he can intercept and alter data traveling between them.
Impersonation is incorrect because it is an attempt to gain access to a computer system by posing as an authorized user. It is the same as masquerading, spoofing, and mimicking.
Session hijacking is incorrect because it is an attack that occurs during an authentication session within a database or system. The attacker disables a user’s desktop system, intercepts responses from the application, and responds in ways that probe the session. Man-in-the-middle, impersonation, and session hijacking are examples of active attacks. Note that MitM attacks can be passive or active depending on the intent of the attacker because there are mild MitM or strong MitM attacks.
304. Which of the following complementary strategies to mitigate token threats raise the threshold for successful attacks?
a.
Physical security mechanismsb.
Multiple security factorsc.
Complex passwordsd.
System and network security controlsPhysical security mechanisms are incorrect because they may be employed to protect a stolen token from duplication. Physical security mechanisms can provide tamper evidence, detection, and response.