Tough Questions 201-210

  1. _______________ is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between the communication endpoints.
     
    (a) ISDN
    (b) Frame Relay
    (c) SMDS
    (d) ATM
     
    Answer:
    (b)
     
    Explanation:
    Frame Relay is a layer 2 connection mechanism that uses packet-switching technology or establishes virtual circuits between the communication endpoints. The Frame Relay network is a shared medium across which virtual circuits are created to provide point-to-point communications. All virtual circuits are independent of, and invisible to, each other. 
     
  2. What is needed to allow an external client to initiate a communication session with an internal system if the network uses a NAT proxy?
     
    (a) IPsec tunnel
    (b) Static mode NAT
    (c) Static private IP address
    (d) Reverse DNS
     
    Answer:
    (b)
     
    Explanation:
    Static mode NAT is needed to allow an outside entity to initiate communications with an internal system behind a NAT proxy.
     
  3. At which OSI model layer does the IPsec protocol function?
     
    (a) Data Link
    (b) Transport
    (c) Session
    (d) Network
     
    Answer:
    (d)
     
    Explanation:
    IPsec operates at the Network layer (Layer 3).
     
  4. When you’re designing a security system for internet-delivered email, which of the following is least important?
     
    (a) Non-repudiation
    (b) Availability
    (c) Message integrity
    (d) Access restriction
     
    Answer:
    (b)
     
    Explanation:
    Although availability is a key aspect of security in general, it is the least important aspect of security systems for internet-delivered email.
     
  5. What is the function of the network access server in a RADIUS environment?
     
    (a) Authentication server
    (b) Client
    (c) AAA server
    (d) Firewall
     
    Answer:
    (b)
     
    Explanation:
    The network access server is the client within a RADIUS architecture. The RADIUS server is the authentication server and provides authentication, authorisation & accounting (AAA) services. The network access server might have a host firewall enabled, but that isn’t the primary function.
     
  6. Accountability requires all of the following items except one. Which item is not required for accountability?
     
    (a) Identification
    (b) Authentication
    (c) Auditing
    (d) Authorisation
     
    Answer:
    (d)
     
  7. Who, or what, grants permissions to users in a DAC model?
     
    (a) Administrators
    (b) Access control list
    (c) Assigned labels
    (d) The data custodian
     
    Answer:
    (b)
     
    Explanation:
    The data custodian (or owner) grants permissions to users in a Discretionary Access Control (DAC) model. Administrators grant permission for resources they own, but not for all resources in a DAC model. A rule-based access control model uses an access control list. The Mandatory Access Control (MAC) model uses labels.
     
  8. Which of the following models is also known as an identity-based access control model?
     
    (a) DAC
    (b) RBAC
    (c) Rule-based access control
    (d) MAC
     
    Answer:
    (a)

    Explanation:
    A Discretionary Access Control (DAC) model is as identity-based access control model. It allows the owner (or data custodian) of a resource to grant permissions at the discretion of the the owner. The rule-based access control model is based on roles within an ACL. The Mandatory Access Control (MAC) model uses assigned labels to identify access.
     
  9. A central authority determines which files a user can access. Which of the following best describes this?
     
    (a) An access control list (ACL)
    (b) An access control matrix
    (c) Discretionary Access Control model
    (d) Non-discretionary access control model
     
    Answer:
    (d)
     
    Explanation:
    A non-discretionary access control model uses a central authority to determine which objects (such as files) that users (and other subjects) can access. In contrast, a Discretionary Access Control (DAC) model allows users to grant & reject access to any objects they own. An ACL is an example of a rule-based access control model that uses rules, not roles.
     
  10. Which of the following BEST describes a characteristic of the MAC model?
     
    (a) Employs explicit-deny philosophy
    (b) Permissive
    (c) Rule-based
    (d) Prohibitive
     
    Answer:
    (d)
     
    Explanation:
    The Mandatory Access Control (MAC) model is prohibitive (not permissive) and uses an implicit-deny (not explicity-deny) philosophy. It uses labels rather than rules.

Leave a comment

Design a site like this with WordPress.com
Get started