b.
Server-oriented attacksc.
Network-oriented attacksd.
User-oriented attacks180. Which of the following is an example of a single point-of-failure?
a.
Security administrationb.
Single sign-onc.
Multiple passwordsd.
Network changesThe other three choices are examples of multiple points-of-failure, where many things can go wrong in many places by many individuals. Every time an employee is terminated or parts of the network changed, the security administrator must deactivate all the employee’s passwords and reconfigure the network. Here, the risk is spread out, not concentrated.
181. Which of the following is an example of a second line-of-defense in attack recognition?
a.
Firewallb.
Attack detection softwarec.
Passwordd.
Internal controlsThe line-of-defenses are security mechanisms for limiting and controlling access to and use of computer system resources. They exercise a directing or restraining influence over the behavior of individuals and the content of computer systems. The line-of-defenses form a core part of defense-in-depth strategy or security-in-depth strategy.
182. Which of the following physical security mechanisms provides a first line-of-defense for a data center?
a.
Interior areas within a buildingb.
Exterior walls of a buildingc.
Perimeter barriers outside a buildingd.
Ceilings of a buildingThe line-of-defenses are security mechanisms for limiting and controlling access to and use of computer system resources. They exercise a directing or restraining influence over the behavior of individuals and the content of computer systems. The line-of-defenses form a core part of defense-in-depth strategy or security-in-depth strategy.
183. Which of the following is the correct approach for an information system to separate user functionality from management functionality?
a.
Application partitioningb.
Boundary protectionc.
Security parametersd.
Controlled interfacesBoundary protection is incorrect because it means controlling communications at the external boundary of an information system and at key internal boundaries within the system. The organization physically allocates publicly accessible information system components (e.g., public Web servers) to separate sub-networks with separate, physical network interfaces.
Security parameters are incorrect because they include security labels and markings, which are associated with information exchanged between information systems.