d.
Access control lists (ACLs)327. For electronic authentication protocol threats, which of the following are assumed to be physically able to intercept authentication protocol runs?
a.
Eavesdroppersb.
Subscriber impostorsc.
Impostor verifiersd.
HijackersSubscriber impostors are incorrect because they need only normal communications access to verifiers or relying parties. Impostor verifiers are incorrect because they may have special network capabilities to divert, insert, or delete packets. But, in many cases, such attacks can be mounted simply by tricking subscribers with incorrect links or e-mails or on Web pages, or by using domain names similar to those of relying parties or verifiers. Therefore, the impostors do not necessarily need to have any unusual network capabilities. Hijackers are incorrect because they must divert communications sessions, but this capability may be comparatively easy to achieve today when many subscribers use wireless network access.
328. Which of the following is
a.
System scanning attacksb.
Denial-of-service attacksc.
System penetration attacksd.
IP address spoofing attacksA system scanning attack occurs when an attacker probes a target network or system by sending different kinds of packets. Denial-of-service attacks attempt to slow or shut down targeted network systems or services. System penetration attacks involve the unauthorized acquisition and/or alteration of system privileges, resources, or data.
329. In-band attacks against electronic authentication protocols include which of the following?
a.
Password guessingb.
Impersonationc.
Password guessing and replayd.
Impersonation and man-in-the-middle330. Which of the following access control policies or models provides a straightforward way of granting or denying access for a specified user?
a.
Role-based access control (RBAC)b.
Access control lists (ACLs)c.
Mandatory access control (MAC)d.
Discretionary access control (DAC)331. What is impersonating a user or system called?
a.
Snooping attackb.
Spoofing attackc.
Sniffing attackd.
Spamming attack