🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

SQL Database Management
279 Questions
2 Views

SQL Database Management

Created by
@CongenialCopernicium

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of pilot testing in software development?

  • To feed test data into two systems
  • To rerun a portion of a test scenario
  • To replace other testing methods
  • To evaluate a specific aspect of a system (correct)
  • What type of IDS stores attributes that characterize an attack for reference?

  • Inferent-based IDS
  • Statistical anomaly-based IDS
  • Signature-based IDS (correct)
  • Event-based IDS
  • What is regression testing used for?

  • To evaluate a specific aspect of a system
  • To feed test data into two systems
  • To test a new product feature
  • To rerun a portion of a test scenario (correct)
  • Who developed one of the first mathematical models of a multilevel-security computer system?

    <p>Bell and LaPadula</p> Signup and view all the answers

    What is the main difference between parallel testing and regression testing?

    <p>Parallel testing involves feeding test data into two systems</p> Signup and view all the answers

    What is proof of concept related to?

    <p>Pilot testing</p> Signup and view all the answers

    What is the purpose of feeding test data into two systems?

    <p>To compare the results of two systems</p> Signup and view all the answers

    What is the main purpose of regression testing?

    <p>To ensure that changes or corrections have not introduced new errors</p> Signup and view all the answers

    Which access control model uses security clearance for subjects?

    <p>Mandatory access control</p> Signup and view all the answers

    What is the primary difference between discretionary access control and mandatory access control?

    <p>The way access is controlled and enforced</p> Signup and view all the answers

    Which protocol was used by the initial version of TACACS for communication between clients and servers?

    <p>UDP</p> Signup and view all the answers

    What is the primary purpose of a TACACS authentication server?

    <p>To authenticate users and determine access</p> Signup and view all the answers

    What is the default port used by TACACS?

    <p>Port 49</p> Signup and view all the answers

    What is the relationship between TACACS and TCP?

    <p>TACACS uses either TCP or UDP</p> Signup and view all the answers

    What is the name of the daemon that runs on the TACACS authentication server?

    <p>TACACSD</p> Signup and view all the answers

    What is the RFC that defines TACACS?

    <p>RFC 1492</p> Signup and view all the answers

    What is the purpose of the 'money' argument in the Data Definition Language?

    <p>To specify a format for storing salaries</p> Signup and view all the answers

    What is the effect of the 'null' keyword in the Data Definition Language?

    <p>It allows a field to contain no value</p> Signup and view all the answers

    What is the purpose of the DROP command in the Data Definition Language?

    <p>To remove entire database objects from the DBMS</p> Signup and view all the answers

    What is the difference between the DROP command and the DELETE command?

    <p>DROP removes entire tables, while DELETE removes individual records</p> Signup and view all the answers

    What is the purpose of the Data Manipulation Language (DML)?

    <p>To retrieve, insert, and modify database information</p> Signup and view all the answers

    What is the purpose of the INSERT command in the Data Manipulation Language?

    <p>To add a new record to an existing table</p> Signup and view all the answers

    What is the most commonly used command in SQL?

    <p>SELECT</p> Signup and view all the answers

    What is the purpose of the SELECT command in the Data Manipulation Language?

    <p>To retrieve specific records from a table</p> Signup and view all the answers

    What is the primary function of preventive technical controls?

    <p>To prevent unauthorized personnel or programs from gaining remote access to computing resources</p> Signup and view all the answers

    What is an example of a technical control used to enforce access control policies?

    <p>Access control software</p> Signup and view all the answers

    What is the primary purpose of synchronous dynamic password tokens?

    <p>To authenticate users</p> Signup and view all the answers

    What type of control is a password considered?

    <p>Technical control</p> Signup and view all the answers

    What is the purpose of a smart card?

    <p>To authenticate users</p> Signup and view all the answers

    What is the primary purpose of antivirus software?

    <p>To detect malware</p> Signup and view all the answers

    What is an example of a logical control?

    <p>Access control software</p> Signup and view all the answers

    What is the purpose of dial-up access control and callback systems?

    <p>To prevent unauthorized remote access</p> Signup and view all the answers

    What is the primary purpose of using banners at log-on time for external users?

    <p>To notify users of monitoring being conducted</p> Signup and view all the answers

    What is an essential element of individual accountability?

    <p>Unique identifiers</p> Signup and view all the answers

    What is the benefit of using a well-crafted logon banner?

    <p>Better legal standing</p> Signup and view all the answers

    Which of the following is NOT an aspect of individual accountability?

    <p>Policies and procedures</p> Signup and view all the answers

    What is the main objective of access control?

    <p>To provide timely access to authorized users</p> Signup and view all the answers

    Which of the following is an additional access control objective?

    <p>Reliability and utility</p> Signup and view all the answers

    What is the primary purpose of logon banners for anonymous or external users?

    <p>To notify users of monitoring being conducted</p> Signup and view all the answers

    Which of the following is a key aspect of accountability?

    <p>Identifying individual users</p> Signup and view all the answers

    What type of attack is an employee trying to protect against by ensuring all cables are shielded, building concrete walls, and installing a white noise generator?

    <p>Emanation Attacks</p> Signup and view all the answers

    What is the term for an error that causes a system to be vulnerable due to its installation environment?

    <p>Environmental error</p> Signup and view all the answers

    What is the primary purpose of shielding cables in a security setup?

    <p>To prevent emanation attacks</p> Signup and view all the answers

    What is the term for the act of intercepting electrical signals that radiate from computing equipment?

    <p>Emanation attacks</p> Signup and view all the answers

    What is the purpose of a white noise generator in a security setup?

    <p>To prevent emanation attacks</p> Signup and view all the answers

    What is the name of the equipment used to prevent emanation attacks?

    <p>TEMPEST equipment</p> Signup and view all the answers

    What is the purpose of building concrete walls that extend from the true floor to the true ceiling in a security setup?

    <p>To prevent emanation attacks</p> Signup and view all the answers

    What is the primary purpose of degaussing a device or overwriting it multiple times?

    <p>To sanitize storage media</p> Signup and view all the answers

    What is the primary limitation of white-box testing?

    <p>It has the potential to miss unimplemented parts of the specification</p> Signup and view all the answers

    What is the primary difference between alpha testing and beta testing?

    <p>Alpha testing is performed by internal users, while beta testing is performed by external users</p> Signup and view all the answers

    What is the primary purpose of pilot testing?

    <p>To provide a limited evaluation of the system</p> Signup and view all the answers

    What is the primary characteristic of a proof of concept?

    <p>It is an early pilot test, usually on an interim platform and with only basic functionalities</p> Signup and view all the answers

    What is the primary benefit of using white-box testing?

    <p>It can test paths within a unit, paths between units, and between subsystems</p> Signup and view all the answers

    What is the primary purpose of beta testing?

    <p>To test the system in a real-world environment</p> Signup and view all the answers

    What is the primary difference between unit testing and integration testing?

    <p>Unit testing is used for testing individual units, while integration testing is used for testing multiple units together</p> Signup and view all the answers

    What is the primary benefit of using alpha testing?

    <p>It identifies defects early in the development process</p> Signup and view all the answers

    What is the primary purpose of using banners at log-on time for external users?

    <p>To notify external users of any monitoring that is being conducted</p> Signup and view all the answers

    What is the benefit of using a well-crafted logon banner?

    <p>It gives a legal stand and makes it obvious to users who should access the system</p> Signup and view all the answers

    Which of the following is NOT an aspect of individual accountability?

    <p>Policies and procedures</p> Signup and view all the answers

    What is the main objective of access control?

    <p>To assure that a system's authorized users have timely and uninterrupted access to the information in the system</p> Signup and view all the answers

    Which of the following is an additional access control objective?

    <p>Reliability and utility</p> Signup and view all the answers

    What is the primary purpose of logon banners for anonymous or external users?

    <p>To notify external users of any monitoring that is being conducted</p> Signup and view all the answers

    What is an essential element of individual accountability?

    <p>Unique identifiers</p> Signup and view all the answers

    Which of the following is a key aspect of accountability?

    <p>Unique identifiers</p> Signup and view all the answers

    What is the primary focus of access control mechanisms?

    <p>Supporting the mission of the organization</p> Signup and view all the answers

    What is the main objective of Business Impact Analysis (BIA)?

    <p>Supporting the mission of the organization</p> Signup and view all the answers

    What is the primary concern in a highly secure environment where data at high classifications cannot be leaked to subjects at lower classifications?

    <p>Identification of potential covert channels</p> Signup and view all the answers

    Which model would an Information Security Professional recommend for a highly secure environment where data at high classifications cannot be leaked to subjects at lower classifications?

    <p>Information Flow Model combined with Bell Lapadula</p> Signup and view all the answers

    What is the primary purpose of access control mechanisms?

    <p>To control access to information</p> Signup and view all the answers

    What is the primary concern in planning and implementing access control mechanisms?

    <p>All of the above</p> Signup and view all the answers

    What is the primary objective of Business Impact Analysis (BIA)?

    <p>To support the mission of the organization</p> Signup and view all the answers

    What is the primary purpose of access control mechanisms in a highly secure environment?

    <p>To control access to information</p> Signup and view all the answers

    What is the security flaw that occurs when two or more processes use the same resource and the sequence of steps within the software can be carried out in an improper order?

    <p>Race condition</p> Signup and view all the answers

    What is the process of intercepting and examining messages to deduce information from patterns in communication?

    <p>Traffic analysis</p> Signup and view all the answers

    What is the term for secretly listening to private conversations of others without their consent?

    <p>Eavesdropping</p> Signup and view all the answers

    What is the result of carrying out processes in an improper sequence in software development?

    <p>Drastically affected output</p> Signup and view all the answers

    What is the goal of an attacker who exploits a race condition in software?

    <p>To force the authorization step to take place before the authentication step</p> Signup and view all the answers

    What is the term for the process of intercepting and examining messages to infer information?

    <p>Traffic analysis</p> Signup and view all the answers

    What is the consequence of carrying out processes in a correct sequence in software development?

    <p>Improved security</p> Signup and view all the answers

    What is the main difference between the correct and incorrect sequence of processes in software development?

    <p>Output is drastically affected</p> Signup and view all the answers

    In a DAC system, who decides who has access to a file?

    <p>The file owner</p> Signup and view all the answers

    What is the main characteristic of Discretionary Access Control (DAC)?

    <p>Access is based on the discretion of the owner</p> Signup and view all the answers

    In synchronous dynamic password tokens, what is generated at fixed time intervals?

    <p>A unique password value</p> Signup and view all the answers

    What is the role of the owner in a DAC system?

    <p>To specify which subjects can access specific resources</p> Signup and view all the answers

    What is the primary purpose of synchronous dynamic password tokens?

    <p>To provide one-time passwords</p> Signup and view all the answers

    In a DAC system, who can be made the owner of files and resources?

    <p>Specific individuals, such as department managers</p> Signup and view all the answers

    What is an access control matrix used for in a DAC system?

    <p>To store an identifier for the file owner</p> Signup and view all the answers

    What is the main advantage of using DAC?

    <p>It provides flexible access control</p> Signup and view all the answers

    In biometric identification systems, what parts of the body are conveniently available for identification when people are fully clothed?

    <p>hands, face, and eyes</p> Signup and view all the answers

    What is the access control model also known as Non Discretionary Access Control (NDAC)?

    <p>Role-based access control</p> Signup and view all the answers

    In Mandatory Access Control (MAC), what is used to specify the sensitivity of objects and the categories they belong to?

    <p>Labels</p> Signup and view all the answers

    What is the primary data access control decision that an organization must make?

    <p>The level of control given to system and data owners</p> Signup and view all the answers

    What is the main difference between Discretionary Access Control (DAC) and Mandatory Access Control (MAC)?

    <p>DAC gives control to system owners, while MAC uses sensitivity labels</p> Signup and view all the answers

    What is the primary function of a TACACS authentication server?

    <p>To authenticate clients and authorize access</p> Signup and view all the answers

    What is the relationship between TACACS and TCP?

    <p>TACACS is a protocol used on top of TCP</p> Signup and view all the answers

    What is the name of the daemon that runs on the TACACS authentication server?

    <p>tac_plus</p> Signup and view all the answers

    What is the primary function of a view in a database?

    <p>To provide a virtual table composed of a query result set</p> Signup and view all the answers

    What is the main advantage of using views in a database?

    <p>They provide a simple way to subset and simplify complex data</p> Signup and view all the answers

    What happens to the data in a view when the underlying table is changed?

    <p>The data in the view is updated accordingly</p> Signup and view all the answers

    What is a key difference between a view and a physical table?

    <p>A table is physical, while a view is virtual</p> Signup and view all the answers

    How much space does a view take up in a database?

    <p>Very little space, as it only stores the definition</p> Signup and view all the answers

    What is one advantage of using views in terms of security?

    <p>They provide an additional layer of security by hiding complex data</p> Signup and view all the answers

    What is an example of how a view can simplify complex data?

    <p>By creating a virtual table that appears as 'Sales2000' or 'Sales2001'</p> Signup and view all the answers

    What is the primary purpose of the SELECT command in the example query?

    <p>To retrieve specific data from multiple tables</p> Signup and view all the answers

    What is the primary purpose of Directive Access Control?

    <p>To specify rules of acceptable behavior</p> Signup and view all the answers

    Which type of access control is used to prevent a security incident or information breach?

    <p>Preventive Access Control</p> Signup and view all the answers

    What is the primary purpose of Detective Access Control?

    <p>To detect and respond to security incidents</p> Signup and view all the answers

    What type of access control is used to remedy a circumstance, mitigate damage, or restore control?

    <p>Corrective Access Control</p> Signup and view all the answers

    What is the primary purpose of Compensating Access Control?

    <p>To substitute for the loss of a primary control or add additional mitigation</p> Signup and view all the answers

    What type of access control is used to restore conditions to normal after a security incident?

    <p>Recovery Access Control</p> Signup and view all the answers

    Which of the following is an example of a Directive Access Control?

    <p>A policy stating that employees may not use Facebook</p> Signup and view all the answers

    What is the primary purpose of access control categories?

    <p>To shape employee behavior to better maintain an environment that supports business objectives</p> Signup and view all the answers

    What is the main objective of strong authentication?

    <p>To use two factors from different categories</p> Signup and view all the answers

    What is the purpose of a database view?

    <p>To retrieve the results of a query</p> Signup and view all the answers

    What is relational algebra used for?

    <p>To operate on relational databases</p> Signup and view all the answers

    What is the purpose of mandatory access control?

    <p>To enforce a set of rules for access control</p> Signup and view all the answers

    What is the primary purpose of access control?

    <p>To authorize access to resources</p> Signup and view all the answers

    What is the difference between discretionary access control and mandatory access control?

    <p>Discretionary access control is more flexible</p> Signup and view all the answers

    What is the purpose of a lattice-based access control model?

    <p>To enforce a hierarchical access control model</p> Signup and view all the answers

    What is the primary purpose of role-based access control?

    <p>To limit access based on user role</p> Signup and view all the answers

    What is the primary purpose of preventive physical controls?

    <p>To prevent unauthorized personnel from entering computing facilities</p> Signup and view all the answers

    Which of the following is an example of a preventive administrative control?

    <p>Security awareness and technical training</p> Signup and view all the answers

    What is the primary purpose of backup files and documentation?

    <p>To ensure business continuity</p> Signup and view all the answers

    What is the purpose of site selection in preventive physical controls?

    <p>To select a safe location for computing facilities</p> Signup and view all the answers

    What is the primary purpose of double door systems in preventive physical controls?

    <p>To prevent unauthorized access</p> Signup and view all the answers

    What is the primary purpose of security guards in preventive physical controls?

    <p>To prevent unauthorized access</p> Signup and view all the answers

    What is the primary purpose of badge systems in preventive physical controls?

    <p>To control access to computing facilities</p> Signup and view all the answers

    What is the primary purpose of fences in preventive physical controls?

    <p>To prevent unauthorized access to computing facilities</p> Signup and view all the answers

    What is the primary characteristic of a limited RBAC system?

    <p>Roles are defined within an application and not necessarily based on the user's organizational job function</p> Signup and view all the answers

    What is the primary characteristic of mandatory access control?

    <p>Controlling access based on security clearance</p> Signup and view all the answers

    What is the key difference between Hybrid RBAC and Full RBAC?

    <p>Hybrid RBAC uses a role that is applied to multiple applications or systems, while Full RBAC uses a role defined by the organization's policy</p> Signup and view all the answers

    What is the primary purpose of Full RBAC?

    <p>To apply permissions based on the organization's policy and access control infrastructure</p> Signup and view all the answers

    What protocol was used by the initial version of TACACS for communication between clients and servers?

    <p>UDP</p> Signup and view all the answers

    What is the main difference between Mandatory Access Control (MAC) and Role-Based Access Control (RBAC)?

    <p>MAC is based on the sensitivity of the object and uses categories to implement the need to know, while RBAC is based on the user's role within the organization</p> Signup and view all the answers

    What is the primary function of a TACACS authentication server?

    <p>To authenticate user requests</p> Signup and view all the answers

    What is a key characteristic of Hybrid RBAC?

    <p>Roles are applied to multiple applications or systems based on a user's specific role within the organization, and may also be assigned solely within specific applications</p> Signup and view all the answers

    What is the default port used by TACACS?

    <p>49</p> Signup and view all the answers

    What is the primary benefit of using Role-Based Access Control (RBAC)?

    <p>It simplifies the management of access control by assigning roles to users</p> Signup and view all the answers

    What is the relationship between TACACS and TCP?

    <p>TACACS uses TCP for communication</p> Signup and view all the answers

    What is the main difference between Limited RBAC and Full RBAC in terms of where roles are defined?

    <p>In Limited RBAC, roles are defined within an application, while in Full RBAC, roles are defined by the organization's policy</p> Signup and view all the answers

    What is the name of the daemon that runs on a TACACS authentication server?

    <p>TACACSD</p> Signup and view all the answers

    What is the RFC that defines TACACS?

    <p>RFC 1492</p> Signup and view all the answers

    What is the primary purpose of attribute certificates?

    <p>To store user attributes</p> Signup and view all the answers

    What is the primary purpose of a mobile communications service provider customizing the mobile terminal client distribution?

    <p>To include one or more root certificates with associated capabilities or permissions</p> Signup and view all the answers

    What is the purpose of a developer acquiring a certificate from a commercial Certificate Authority (CA)?

    <p>To validate their identity and obtain a certificate to sign their software</p> Signup and view all the answers

    What is the advantage of separating the identity and authorization certificates?

    <p>To improve key management and recovery from errant software</p> Signup and view all the answers

    What is typically done to the software submitted by a developer before generating an authorization certificate?

    <p>It is tested or profiled by the processor</p> Signup and view all the answers

    What is the purpose of the 'install and execute' capability in a root certificate?

    <p>To allow developers to install and execute their software</p> Signup and view all the answers

    What is the purpose of validating a developer's identity through out-of-band mechanisms?

    <p>To verify the developer's identity and issue a certificate</p> Signup and view all the answers

    What is the purpose of an ephemeral asymmetric key-pair in the software distribution process?

    <p>To sign the software as the last step of preparation for distribution</p> Signup and view all the answers

    What is the benefit of customizing the mobile terminal client distribution with root certificates?

    <p>It enables service providers to control and manage access to the mobile phone operating system</p> Signup and view all the answers

    What is a masquerade attack?

    <p>An attack that uses a fake identity to gain unauthorized access to personal computer information</p> Signup and view all the answers

    What determines the amount of access a masquerade attacker gets?

    <p>The level of authorization they've managed to attain</p> Signup and view all the answers

    What is the purpose of a security model like Bell-LaPadula?

    <p>To apply specific rules to control how the subject-to-object interactions take place</p> Signup and view all the answers

    What type of security system is the Bell-LaPadula model?

    <p>Multilevel security system</p> Signup and view all the answers

    When can a masquerade attack be triggered?

    <p>By someone within the organization or by an outsider if the organization is connected to a public network</p> Signup and view all the answers

    What is the result of a masquerade attack if the attacker gains the highest access authority?

    <p>They have a full smorgasbord of cybercrime opportunities</p> Signup and view all the answers

    What is the purpose of the authorization process in a system?

    <p>To control how the subject-to-object interactions take place</p> Signup and view all the answers

    What is the difference between a masquerade attack and a personal attack?

    <p>A personal attack is less common but still harmful</p> Signup and view all the answers

    What is the primary function of a Host-Based Intrusion Detection System (HIDS)?

    <p>To monitor system and event logs</p> Signup and view all the answers

    Why is it important to have both NIDS and HIDS on critical servers?

    <p>To detect patterns of attacks on both network and host levels</p> Signup and view all the answers

    What is NOT a security characteristic to consider when choosing a biometric identification system?

    <p>Cost</p> Signup and view all the answers

    What is the main difference between a HIDS and a NIDS?

    <p>A HIDS monitors system logs, while a NIDS monitors network traffic</p> Signup and view all the answers

    What is the primary objective of using a HIDS?

    <p>To detect and prevent attacks on a host</p> Signup and view all the answers

    What is monitored by a HIDS?

    <p>Dynamic behavior and state of a computer system</p> Signup and view all the answers

    What is the purpose of a HIDS in relation to security policy?

    <p>To detect circumvention of security policy</p> Signup and view all the answers

    What is the benefit of having both NIDS and HIDS on critical servers?

    <p>To provide comprehensive security coverage</p> Signup and view all the answers

    What is the primary purpose of views in databases?

    <p>To provide abstraction and security</p> Signup and view all the answers

    What type of attack involves using a fake identity to gain unauthorized access to personal computer information?

    <p>Masquerade attack</p> Signup and view all the answers

    What is a characteristic of rows in a view?

    <p>They are not ordered</p> Signup and view all the answers

    What is the difference between black-box testing and white-box testing?

    <p>White-box testing tests internal structures, while black-box testing tests functionality</p> Signup and view all the answers

    What is the primary goal of a masquerade attack?

    <p>To gain unauthorized access to personal computer information</p> Signup and view all the answers

    In which security model is the subject's clearance compared to the object's classification?

    <p>Bell-LaPadula model</p> Signup and view all the answers

    What is the purpose of normalization in databases?

    <p>To organize data to minimize data redundancy</p> Signup and view all the answers

    What is the main advantage of using views in databases?

    <p>They provide abstraction and security</p> Signup and view all the answers

    What is the main characteristic of the Bell-LaPadula model?

    <p>It uses a multilevel security system</p> Signup and view all the answers

    Who developed the Bell-LaPadula model?

    <p>US Military</p> Signup and view all the answers

    What is the primary purpose of a view in a database?

    <p>To provide abstraction and security</p> Signup and view all the answers

    What is the primary purpose of the Data Definition Language (DDL)?

    <p>To create, modify, and delete views and relations in a database</p> Signup and view all the answers

    What is the primary limitation of a masquerade attack?

    <p>The amount of access the attacker can gain</p> Signup and view all the answers

    What is a common use of views in databases?

    <p>To make it easier to create lossless join decomposition</p> Signup and view all the answers

    What is the primary purpose of a database administrator using DDL commands?

    <p>To create and modify database structures</p> Signup and view all the answers

    What is the primary benefit of a masquerade attack?

    <p>It allows the attacker to gain full access to the system</p> Signup and view all the answers

    What is the relationship between views and tables?

    <p>A view is a relational table</p> Signup and view all the answers

    What is the main difference between the CREATE and DROP commands in DDL?

    <p>CREATE is used to create database objects, while DROP is used to delete database objects</p> Signup and view all the answers

    What access control model is based on a lattice structure?

    <p>Bell-LaPadula model</p> Signup and view all the answers

    What is the primary motivation behind a masquerade attack?

    <p>To gain unauthorized access to personal computer information</p> Signup and view all the answers

    What is the purpose of the least upper bound in the Bell-LaPadula model?

    <p>To determine the highest level of access a user can have to a file</p> Signup and view all the answers

    What is the star property in the Bell-LaPadula model?

    <p>A user's least upper bound access is 'READ', and their least lower bound is 'NO WRITE'</p> Signup and view all the answers

    What is the main difference between the Bell-LaPadula model and Role-Based Access Control (RBAC)?

    <p>Bell-LaPadula is based on a lattice structure, while RBAC is based on roles</p> Signup and view all the answers

    What is the primary purpose of the Data Manipulation Language (DML)?

    <p>To perform data manipulation operations</p> Signup and view all the answers

    What is an example of something you do that involves strong authentication?

    <p>Typing text on your keyboard</p> Signup and view all the answers

    What type of access control technique is NOT included in the common techniques?

    <p>Relevant Access Controls</p> Signup and view all the answers

    What operations are used to define a database view?

    <p>Join, Project, and Select</p> Signup and view all the answers

    What is the term for a single entry in a relational database?

    <p>Tuple</p> Signup and view all the answers

    What is the primary function of Mandatory Access Control?

    <p>To provide access based on security clearance</p> Signup and view all the answers

    What is the primary difference between Discretionary Access Control and Mandatory Access Control?

    <p>DAC is based on user identity, MAC is based on security clearance</p> Signup and view all the answers

    What is the term for the mathematics underlying SQL operations?

    <p>Relational Algebra</p> Signup and view all the answers

    What is the purpose of a database view?

    <p>To present the result of a query</p> Signup and view all the answers

    What type of controls are also known as logical controls and can be built into the operating system, be software applications, or can be supplemental hardware/software units?

    <p>Preventive/Technical Pairing</p> Signup and view all the answers

    What best describes a scenario where a user has more computer rights, permissions, and access than what is required for the tasks the user needs to fulfill?

    <p>Excessive Privileges</p> Signup and view all the answers

    What information do sensitivity labels attached to objects contain in Mandatory Access Control?

    <p>The item's classification and category set</p> Signup and view all the answers

    What is the primary purpose of technical controls such as encryption and access control?

    <p>To prevent security breaches</p> Signup and view all the answers

    What is an example of a logical control used to enforce access control policies?

    <p>Access control lists</p> Signup and view all the answers

    What is the primary purpose of antivirus software?

    <p>To prevent security breaches</p> Signup and view all the answers

    What is an example of a physical control used to enforce access control policies?

    <p>Shielded cables</p> Signup and view all the answers

    What is the primary purpose of logon banners for external users?

    <p>To inform users of their responsibilities</p> Signup and view all the answers

    What is the primary purpose of synchronous dynamic password tokens?

    <p>To generate a new password value at fixed time intervals</p> Signup and view all the answers

    What type of control is a password considered?

    <p>Preventive technical control</p> Signup and view all the answers

    What is the primary purpose of preventive technical controls?

    <p>To prevent unauthorized access</p> Signup and view all the answers

    What is an example of a technical control used to enforce access control policies?

    <p>Access control software</p> Signup and view all the answers

    What is the primary purpose of antivirus software?

    <p>To prevent virus attacks</p> Signup and view all the answers

    What is the primary purpose of dial-up access control and callback systems?

    <p>To prevent unauthorized access</p> Signup and view all the answers

    What is the primary purpose of logon banners for external users?

    <p>To notify users of legal responsibilities</p> Signup and view all the answers

    What is the primary objective of access control?

    <p>To prevent unauthorized access</p> Signup and view all the answers

    What is the main focus of a Business Impact Analysis (BIA)?

    <p>Supporting the mission of the organization</p> Signup and view all the answers

    Which model would you recommend to a client looking to identify potential covert channels in a highly secure environment?

    <p>Information Flow Model combined with Bell Lapadula</p> Signup and view all the answers

    What is the primary concern of the client in the highly secure environment?

    <p>Identification of potential covert channels</p> Signup and view all the answers

    What is the purpose of an access control policy?

    <p>To control access to information and personnel</p> Signup and view all the answers

    What is the term for the act of intercepting electrical signals that radiate from computing equipment?

    <p>Emanation</p> Signup and view all the answers

    What is the primary purpose of degaussing a device or overwriting it multiple times?

    <p>To delete sensitive data</p> Signup and view all the answers

    What is the primary purpose of building concrete walls in a security setup?

    <p>To prevent emanation attacks</p> Signup and view all the answers

    What is the main objective of access control?

    <p>To prevent unauthorized access</p> Signup and view all the answers

    What is the primary goal of a noninterference model in information security?

    <p>To minimize leakages that may happen through covert channels</p> Signup and view all the answers

    What is the main limitation of access control lists in file systems?

    <p>They do not control how the data is used afterwards</p> Signup and view all the answers

    What is the primary purpose of assigning security levels to variables in low-level information flow analysis?

    <p>To control the flow of information between variables</p> Signup and view all the answers

    What is the main difference between publicly observable information and secret information?

    <p>Publicly observable information is assigned a low security level, while secret information is assigned a high security level</p> Signup and view all the answers

    What is the primary benefit of using a lattice model to represent security levels?

    <p>It allows information to flow only upwards in the lattice</p> Signup and view all the answers

    What is the primary goal of cryptography in information security?

    <p>To exchange information privately across a non-secure channel</p> Signup and view all the answers

    What is the main limitation of firewalls in information security?

    <p>They provide no guarantees about information propagation</p> Signup and view all the answers

    What is the primary purpose of restricting flows to high variables in information security?

    <p>To ensure confidentiality by restricting flows to high variables</p> Signup and view all the answers

    What is the primary goal of the Biba Integrity Model?

    <p>Prevent data modification by unauthorized parties</p> Signup and view all the answers

    What is the key principle of the Biba model?

    <p>no read down, no write up</p> Signup and view all the answers

    What is a key limitation of the Bell-LaPadula model?

    <p>It only addresses data confidentiality</p> Signup and view all the answers

    What is the relationship between a subject's integrity level and their ability to create content?

    <p>Subjects can only create content at or below their own integrity level</p> Signup and view all the answers

    What is the main difference between the Biba model and the Clark-Wilson model?

    <p>The Biba model only addresses the first goal of data integrity</p> Signup and view all the answers

    What is the purpose of the Biba model?