194. For major functions of intrusion detection and prevention system technologies, which of the following statements are true?
1. It is not possible to eliminate all false positives and false negatives.
2. Reducing false positives increases false negatives and vice versa.
3. Decreasing false negatives is always preferred.
4. More analysis is needed to differentiate false positives from false negatives.
a. 1 only
b. 2 only
c. 3 only
d. 1, 2, 3, and 4
195. Which of the following authentication techniques is impossible to forge?
a. What the user knows
b. What the user has
c. What the user is
d. Where the user is
Geodetic location, as calculated from a location signature, adds a fourth and new dimension to user authentication and access control mechanisms. The signature is derived from the user’s location. It can be used to determine whether a user is attempting to log in from an approved location. If unauthorized activity is detected from an authorized location, it can facilitate finding the user responsible for that activity.
196. How does a rule-based access control mechanism work?
a. It is based on filtering rules.
b. It is based on identity rules.
c. It is based on access rules.
d. It is based on business rules.
197. Which of the following is an example of a system integrity tool used in the technical security control category?
a. Auditing
b. Restore to secure state
c. Proof-of-wholeness
d. Intrusion detection tool
Auditing is a detective control, which enables monitoring and tracking of system abnormalities. “Restore to secure state” is a recovery control that enables a system to return to a state that is known to be secure, after a security breach occurs. Intrusion detection tools detect security breaches.
198. Individual accountability does
a. Unique identifiers
b. Access rules
c. Audit trails
d. Policies and procedures
The concept of individual accountability drives the need for many security safeguards, such as unique (user) identifiers, audit trails, and access authorization rules. Policies and procedures indicate what to accomplish and how to accomplish objectives. By themselves, they do not exact individual accountability.
199. From an access control viewpoint, which of the following is computed from a passphrase?
a. Access password
b. Personal password
c. Valid password
d. Virtual password
199.d. A virtual password is a password computed from a passphrase that meets the requirements of password storage (e.g., 56 bits for DES). A passphrase is a sequence of characters, longer than the acceptable length of a regular password, which is transformed by a password system into a virtual password of acceptable length.