Fill in the blank with an appropriate phrase The is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.
The Biba model is a formal state transition system of computer security policy that describes a set of access control rules
designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may
not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.
You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems?
NIST has developed a suite of documents for conducting Certification & Accreditation (C&A). These documents are as follows:
NIST Special Publication 800-37: This document is a guide for the security certification and accreditation of Federal Information
Systems.
NIST Special Publication 800-53: This document provides a guideline for security controls for Federal Information Systems.
NIST Special Publication 800-53A. This document consists of techniques and procedures for verifying the effectiveness of security
controls in Federal Information System.
NIST Special Publication 800-59: This document is a guideline for identifying an information system as a National Security System.
NIST Special Publication 800-60: This document is a guide for mapping types of information and information systems to security
objectives and risk levels.
Which of the following are the levels of public or commercial data classification system?
Each correct answer represents a complete solution. Choose all that apply.
The public or commercial data classification is also built upon a four-level model, which are as follows:
Public
Sensitive
Private
Confidential
Each level (top to bottom) represents an increasing level of sensitivity.
The public level is similar to unclassified level military classification system. This level of data should not cause any damage if disclosed.
Sensitive is a higher level of classification than public level data. This level of data requires a greater level of protection to maintain
confidentiality.
The Private level of data is intended for company use only. Disclosure of this level of data can damage the company.
The Confidential level of data is considered very sensitive and is intended for internal use only. Disclosure of this level of data can cause
serious damage to the company.
Answer C and E are incorrect. Unclassified and secret are the levels of military data classification.
Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?
An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or
disabling of computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks, as examples, by
crackers, malware and/or disgruntled employees. An IDS cannot directly detect attacks within properly encrypted traffic. An intrusion detection
system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes
network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation,
unauthorized logins and access to sensitive files, and malware (viruses, trojan horses, and worms).
Answer D is incorrect. Access Control List (ACL) is the most commonly used object in Cisco IOS. It filters packets or network traffic by
controlling whether routed packets are forwarded or blocked at the router's interfaces. According to the criteria specified within the access
lists, router determines whether the packets to be forwarded or dropped. Access control list criteria could be the source or destination
address of the traffic or other information. The types of Cisco ACLs are Standard IP, Extended IP, IPX, Appletalk, etc.
Answer B is incorrect. Internet Protocol Security (IPSec) is a method of securing data. It secures traffic by using encryption and digital
signing. It enhances the security of data as if an IPSec packet is captured, its contents cannot be read. IPSec also provides sender verification
that ensures the certainty of the datagram's origin to the receiver.
Answer A is incorrect. Direct-attached storage (DAS) is a digital storage system that is directly attached to a server or workstation,
without using a storage network.
Which of the following types of signatures is used in an Intrusion Detection System to trigger on attacks that attempt to reduce the level of a resource or system, or to cause it to crash?
Following are the basic categories of signatures:
Informational (benign): These types of signatures trigger on normal network activity. For example:
ICMP echo requests
The opening or closing of TCP or UDP connections
Reconnaissance: These types of signatures trigger on attacks that uncover resources and hosts that are reachable, as well as any
possible vulnerabilities that they might contain. For example:
Reconnaissance attacks include ping sweeps
DNS queries
Port scanning
Access: These types of signatures trigger on access attacks, which include unauthorized access, unauthorized escalation of privileges,
and access to protected or sensitive data. For example:
Back Orifice
A Unicode attack against the Microsoft IIS
NetBus
DoS: These types of signatures trigger on attacks that attempt to reduce the level of a resource or system, or to cause it to crash. For
example:
TCP SYN floods
The Ping of Death
Smurf
Fraggle
Trinoo
Tribe Flood Network
Dalene
8 days agoLouvenia
15 days agoLuisa
22 days agoEdna
30 days agoHannah
1 month agoFelicia
1 month agoCharlene
2 months agoTegan
2 months agoWillow
2 months agoValentine
2 months agoJunita
3 months agoKaycee
3 months agoDelila
3 months agoTegan
3 months agoLeanna
4 months agoTammi
4 months agoLeana
4 months agoMerlyn
4 months agoMoira
5 months agoLachelle
5 months agoRosenda
5 months agoMarilynn
6 months agoRutha
6 months agoArlette
8 months agoCamellia
10 months agoDortha
11 months agoRodrigo
1 year agoGarry
1 year agoRonny
1 year agoParis
1 year agoAja
1 year agoLazaro
1 year agoTawanna
1 year agoCarissa
1 year agoWynell
1 year agoMabelle
1 year agoAshley
1 year agoShenika
1 year agoNicolette
1 year agoTerina
1 year agoDustin
1 year agoMarylin
1 year agoDulce
1 year agoCarmela
1 year agoLeah
1 year agoErinn
2 years agoLarue
2 years agoRochell
2 years agoElli
2 years ago