d.
Recovery services69. The security services that provide for availability security objectives also provide for which of the following security objectives?
a.
Integrityb.
Confidentialityc.
Accountabilityd.
AssuranceThe primary availability services are those that directly impact the ability of the system to maintain operational effectiveness. One aspect of maintaining operational effectiveness is protection from unauthorized changes or deletions by defining authorized access and enforcing access controls. Operational effectiveness is also maintained by detecting intrusions, detecting loss of wholeness, and providing the means of returning to a secure state.
The services that provide for availability also provide for integrity. This is because maintaining or restoring system integrity is an essential part of maintaining system availability.
By definition, integrity is the property that protected and sensitive data has not been modified or deleted in an unauthorized and undetected manner. By definition, availability means ensuring timely and reliable access to and use of data and information by authorized users. How is the data available to authorized users if it was deleted or destroyed?
The security services provided to fulfill the security objectives of availability, confidentiality, accountability, and assurance together have nothing in common.
70. Web spoofing using the man-in-the-middle attack is an example of which of the following?
a.
Browser-oriented attacksb.
Server-oriented attacksc.
Network-oriented attacksd.
User-oriented attacks71. To mitigate the risks of using active content, which of the following is an example of a technical safeguard?
a.
Filtersb.
Incident response handlingc.
Security policyd.
Risk analysis72. To mitigate the risks of using active content, which of the following is an example of a technical safeguard?
a.
Security auditb.
Evaluated technologyc.
Application settingsd.
Software cages73. To mitigate the risks of using active content, which of the following is an example of a technical safeguard?
a.
Version controlb.
Digital signaturesc.
Patch managementd.
System isolation74. To mitigate the risks of using active content, which of the following is an example of a technical safeguard?
a.
Virtualizationb.
Isolate proprietary program componentsc.
Proof carrying coded.
Isolate tightly bounded programs