Which of the following statements about role-based access control (RBAC) model is true?
A. In this model, a user can access resources according to his role in the organization.
B. In this model, the permissions are uniquely assigned to each user account.
C. In this model, the same permission is assigned to each user account.
D. In this model, the users can access resources according to their seniority.
Which of the following protocols work at the data-link layer? Each correct answer represents a complete solution. Choose two.
A. NFS
B. SSL
C. ARP
D. PPP
Which of the following statements about Due Care policy is true?
A. It provides information about new viruses.
B. It is a method used to authenticate users on a network.
C. It identifies the level of confidentiality of information.
D. It is a method for securing database servers.
Which of the following protocols is used to securely connect to a private network by a remote client using the Internet?
A. PAP
B. PPTP
C. UDP
D. IPSec
Which of the following rate systems of the Orange book has no security controls?
A. C-rated
B. D-rated
C. A-rated
D. E-rated
Which of the following OSI model layers handles addressing and routing?
A. Session
B. Physical
C. Network
D. Application
Which of the following protocols is used to retrieve e-mails from a remote mail server?
A. SNMP
B. POP3
C. SMTP
D. IGMP
Which of the following uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?
A. SSL
B. TLS
C. PGP
D. EAP
Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.
A. IPSec
B. S/MIME
C. PGP
D. TLS
Which of the following is a reason to implement security logging on a DNS server?
A. For monitoring unauthorized zone transfer
B. For preventing malware attacks on a DNS server
C. For recording the number of queries resolved
D. For measuring a DNS server's performance