1. Covert channel is a communication channel that can be used for:
A. Violating the security policy
B. Strengthening the security policy
C. Hardening the system
D. Protecting the DMZ
2. Enforcing minimum privileges for general system users can be easily achieved through the use of:
3. Which of the following services should be logged for security purpose?
D. No Answer is Correct
4. All logs are kept on archive for a period of time. What determines this period of time?
A. Retention policies
B. Administrator preferences
5. With RBAC, roles are:
A. All equal
B. Based on labels
C. Based on flows
Home - Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.