Get this Security+ CertiGuide for your own computer.
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Also available: 300-question Security+ practice test!
Get It Here!

Custom Search

Table Of Contents  CertiGuide to Security+
 9  Chapter 5:  Operational/Organizational Security (Domain 5.0; 15%)

Previous Topic/Section
5.10  Summary
Previous Page
Pages in Current Topic/Section
Next Page
5.12  Success Answers
Next Topic/Section

5.11  Success Questions

1. What principle requires that a user be given no more privilege than necessary to perform a job?

A. Principle of aggregate privilege

B. Principle of effective privilege

C. Principle of most privilege

D. Principle of least privilege


2. Which of the following are potential firewall problems that should be logged?

A. Reboot

B. Proxies restarted

C. Changes to the configuration file.

D. No Answer is Correct


3. Logs must be secured to prevent:

A. Creation modification and destruction

B. Modification, deletion, and destruction

C. Modification, deletion, and initialization

D. Modification, deletion, and inspection


4. If the computer system being used contains confidential information, users must not:

A. Share their desks

B. Encrypt their passwords

C. Leave their computer without first logging off

D. All choices are correct


5. Which of the following user items can be shared?

A. Home directory

B. ID card

C. Password

D. No Answer is Correct


6. With RBAC, each user can be assigned:

A. A token role

B. Only one role

C. A security token

D. One or more roles


7. The Lattice Based Access Control model was developed MAINLY to deal with:

A. Integrity

B. Confidentiality

C. Affinity

D. No Answer is Correct


8. Under MAC, who can change the category of a resource?

A. All users

B. All managers

C. Administrator only

D. No Answer is Correct


9. A method for a user to identify and present credentials only once to a system is known as:


B. IPSec




10. Prosecution of illegal break-ins to computer systems fails most often because of a failure of:

A. Chain of Supported Facts

B. Chain of Custody

C. Chain of Electrons

D. Chain of Witnesses

Previous Topic/Section
5.10  Summary
Previous Page
Pages in Current Topic/Section
Next Page
5.12  Success Answers
Next Topic/Section

If you find useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $

Home - Table Of Contents - Contact Us

CertiGuide for Security+ ( on
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al. Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.