Appendix A. Answer Key

CHAPTER 1 Access Control Framework

  1. Policies

  2. B

  3. C

  4. A

  5. Unknown

  6. B

  7. D

  8. C

  9. B

  10. D

  11. A

  12. Administrative

  13. B

  14. Behavioral

CHAPTER 2 Assessing Risk and Its Impact on Access Control

  1. Probability of occurrence

  2. A

  3. Quantitative

  4. B

  5. B

  6. A

  7. A, B, and C

  8. B

  9. B

  10. A

  11. A

  12. B

  13. B

  14. $150,000

  15. ARO = 2

  16. $25,000

CHAPTER 3 Business Drivers for Access Controls

  1. A

  2. Confidential

  3. A

  4. A

  5. A

  6. B

  7. A

  8. Confidentiality agreement

  9. A

  10. A

  11. Confidentiality agreement

  12. A

CHAPTER 4 Access Control Policies, Standards, Procedures, and Guidelines

  1. A

  2. C

  3. B

  4. A

  5. A

  6. Administrative

  7. Publicly traded

  8. A

  9. B

  10. Discretionary

  11. Guidelines

CHAPTER 5 Unauthorized Access and Security Breaches

  1. B

  2. Computer Fraud and Abuse Act

  3. A

  4. B

  5. A

  6. E

  7. A and C

  8. A, B, D, and E

  9. A

  10. A

  11. Vandalism

  12. A

CHAPTER 6 Mapping Business Challenges to Access Control Types

  1. A

  2. Risk avoidance

  3. Risk acceptance

  4. Risk transference

  5. Risk mitigation

  6. Integrity

  7. A

  8. Sensitive

  9. A

  10. C

  11. B

  12. B

  13. B

  14. View full record

CHAPTER 7 Human Nature and Organizational Behavior

  1. Status and wealth

  2. A

  3. A, B, C, and D

  4. C

  5. A

  6. B

  7. Disgruntled

  8. E

  9. A

  10. A and C

  11. Two-person control

  12. A

  13. B

  14. A

CHAPTER 8 Access Control for Information Systems

  1. A

  2. B

  3. ACL

  4. System-audit

  5. Binary large objects, or BLOBs

  6. C

  7. A

  8. A

  9. B

  10. UNIX and Linux

  11. B

  12. Destroy

  13. A and C

CHAPTER 9 Physical Security and Access Control

  1. B

  2. C

  3. B

  4. B and D

  5. D

  6. A

  7. Dark

  8. D

  9. Physiological, behavioral

  10. B

  11. The point at which Type I and Type II errors are equal

  12. D

  13. A

  14. D

  15. B

CHAPTER 10 Access Control in the Enterprise

  1. D

  2. Mandatory access control (MAC), discretionary access control (DAC), role-based access control (RBAC), attribute-based access control (ABAC)

  3. B and C

  4. B

  5. B, C, and E

  6. A

  7. A and C

  8. B

  9. C

  10. A

  11. A

  12. C

CHAPTER 11 Access Control System Implementations

  1. B

  2. ISO

  3. B

  4. B and C

  5. B, C, and E

  6. D

  7. Federal Financial Institutions Examinations Council (FFEIC)

  8. 128

  9. C

  10. NIST

CHAPTER 12 Access Control Systems for Remote Workers

  1. B

  2. Authentication, Authorization, and Accounting

  3. B

  4. B, C, and E

  5. A

  6. C

  7. A, C, and D

  8. Hash

  9. A

  10. D

  11. Two-way

  12. Three-way

  13. C

  14. B

CHAPTER 13 Public Key Infrastructure and Encryption

  1. B

  2. D

  3. B and C

  4. A and D

  5. B

  6. A, B, and C

  7. 1,024 bits

  8. C

  9. C

  10. B and E

CHAPTER 14 Testing Access Control Systems

  1. A

  2. D

  3. B and C

  4. Nonintrusive

  5. Intrusive

  6. C

  7. A

  8. E

  9. A

  10. A

  11. B

  12. C

  13. C

  14. A, C, and D

CHAPTER 15 Access Control Assurance

  1. Confidentiality, integrity, availability

  2. C

  3. A, C, and D

  4. B

  5. A

  6. Blacklist

  7. Whitelist

  8. A

  9. C

  10. B

  11. B

  12. B

  13. C

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset