Like what you see? Get it in one document for easy printing!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Test yourself better with 300 extra Security+ questions!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+
 9  Chapter 5:  Operational/Organizational Security (Domain 5.0; 15%)

Previous Topic/Section
5.10  Summary
Previous Page
Pages in Current Topic/Section
1
Next Page
5.12  Success Answers
Next Topic/Section

5.11  Success Questions

1. What principle requires that a user be given no more privilege than necessary to perform a job?

A. Principle of aggregate privilege

B. Principle of effective privilege

C. Principle of most privilege

D. Principle of least privilege

 

2. Which of the following are potential firewall problems that should be logged?

A. Reboot

B. Proxies restarted

C. Changes to the configuration file.

D. No Answer is Correct

 

3. Logs must be secured to prevent:

A. Creation modification and destruction

B. Modification, deletion, and destruction

C. Modification, deletion, and initialization

D. Modification, deletion, and inspection

 

4. If the computer system being used contains confidential information, users must not:

A. Share their desks

B. Encrypt their passwords

C. Leave their computer without first logging off

D. All choices are correct

 

5. Which of the following user items can be shared?

A. Home directory

B. ID card

C. Password

D. No Answer is Correct

 

6. With RBAC, each user can be assigned:

A. A token role

B. Only one role

C. A security token

D. One or more roles

 

7. The Lattice Based Access Control model was developed MAINLY to deal with:

A. Integrity

B. Confidentiality

C. Affinity

D. No Answer is Correct

 

8. Under MAC, who can change the category of a resource?

A. All users

B. All managers

C. Administrator only

D. No Answer is Correct

 

9. A method for a user to identify and present credentials only once to a system is known as:

A. SEC

B. IPSec

C. SSL

D. SSO

 

10. Prosecution of illegal break-ins to computer systems fails most often because of a failure of:

A. Chain of Supported Facts

B. Chain of Custody

C. Chain of Electrons

D. Chain of Witnesses


Previous Topic/Section
5.10  Summary
Previous Page
Pages in Current Topic/Section
1
Next Page
5.12  Success Answers
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.