Fill in the blank with an appropriate phrase The is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.
See Below Explanation:
The Biba model is a formal state transition system of computer security policy that describes a set of access control rules
designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may
not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.
Answer : A
The Biba model is a formal state transition system of computer security policy that describes a set of access control rules
designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may
not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.
In which of the following deployment models of cloud is the cloud infrastructure administered by the organizations or a third party? Each correct answer represents a complete solution. Choose two.
Answer : A, D
In private cloud, the cloud infrastructure is operated exclusively for an organization. The private cloud infrastructure is administered by the
organization or a third party, and exists on premise and off premise.
In community cloud, the cloud infrastructure is shared by a number of organizations and supports a particular community. The community cloud
infrastructure is administered by the organizations or a third party and exists on premise or off premise.
Answer B is incorrect. In public cloud, the cloud infrastructure is administered by an organization that sells cloud services.
Answer C is incorrect. In hybrid cloud, the cloud infrastructure is administered by both, i.e., an organization and a third party.
Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?
Answer : B
A full-interruption test includes the operations that shut down at the primary site and are shifted to the recovery site according to the disaster
recovery plan. It operates just like a parallel test. The full-interruption test is very expensive and difficult to arrange. Sometimes, it causes a
major disruption of operations if the test fails.
Answer A is incorrect. The structured walk-through test is also known as the table-top exercise. In structured walk-through test, the
team members walkthrough the plan to identify and correct weaknesses and how they will respond to the emergency scenarios by stepping
in the course of the plan. It is the most effective and competent way to identify the areas of overlap in the plan before conducting more
challenging training exercises.
Answer C is incorrect. A parallel test includes the next level in the testing procedure, and relocates the employees to an alternate
recovery site and implements site activation procedures. These employees present with their disaster recovery responsibilities as they would
for an actual disaster. The disaster recovery sites have full responsibilities to conduct the day-to-day organization's business.
Answer D is incorrect. A simulation test is a method used to test the disaster recovery plans. It operates just like a structured walk-
through test. In the simulation test, the members of a disaster recovery team present with a disaster scenario and then, discuss on
appropriate responses. These suggested responses are measured and some of them are taken by the team. The range of the simulation test
should be defined carefully for avoiding excessive disruption of normal business activities.
The NIST ITL Cloud Research Team defines some primary and secondary technologies as the fundamental elements of cloud computing in its "Effectively and Securely Using the Cloud Computing Paradigm" presentation. Which of the following technologies are included in the primary technologies?
Each correct answer represents a complete solution. Choose all that apply.
Answer : B, C, D
The primary technologies defined by the NIST ITL Cloud Research Team in its 'Effectively and Securely Using the Cloud Computing Paradigm'
presentation are as follows:
Virtualization
Grid technology
SOA (Service Oriented Architecture)
Distributed computing
Broadband network
Browser as a platform
Free and open source software
Answer A is incorrect. It is defined as the secondary technology.
Which of the following can be used to accomplish authentication?
Each correct answer represents a complete solution. Choose all that apply.
Answer : B, C, D
The following can be used to accomplish authentication:
1.Password
2.Biometrics
3.Token
A password is a secret word or string of characters that is used for authentication, to prove identity, or gain access to a resource.
Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the U.S. Federal Government information security standards? Each correct answer represents a complete solution. Choose all that apply.
Answer : A, C, D
Following are the various U.S. Federal Government information security standards:
AC Access Control
AT Awareness and Training
AU Audit and Accountability
CA Certification, Accreditation, and Security Assessments
CM Configuration Management
CP Contingency Planning
IA Identification and Authentication
IR Incident Response
MA Maintenance
MP Media Protection
PE Physical and Environmental Protection
PL Planning
PS Personnel Security
RA Risk Assessment
SA System and Services Acquisition
SC System and Communications Protection
SI System and Information Integrity
Answer B is incorrect. Information systems acquisition, development, and maintenance is an International information security
standard.
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. You have searched all open ports of the we-are-secure server. Now, you want to perform the next information-gathering step, i.e., passive OS fingerprinting. Which of the following tools can you use to accomplish the task?
Answer : D
According to the scenario, you have searched all open ports of the we-are-secure server. Now you want to perform the next information-
gathering step, i.e., passive OS fingerprinting. For this, you will use the P0f tool to accomplish the task. P0f is a passive OS fingerprinting tool
that is used to identify the operating system of a target host simply by examining captured packets even when the device is behind a packet
firewall. It does not generate any additional direct or indirect network traffic. P0f can also be used to gather various information, such as
firewall presence, NAT use (for policy enforcement), existence of a load balancer setup, the distance to the remote system and its uptime, etc.
Answer C is incorrect. Nmap is used for active OS fingerprinting. Nmap is a free open-source utility for network exploration and security
auditing. It is used to discover computers and services on a computer network, thus creating a 'map' of the network. Just like many simple
port scanners, Nmap is capable of discovering passive services. In addition, Nmap may be able to determine various details about the remote
computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that
product, presence of some firewall techniques and, on a local area network, even vendor of the remote network card. Nmap runs on Linux,
Microsoft Windows etc.
Answer A is incorrect. SuperScan is a TCP/UDP port scanner. It also works as a ping sweeper and hostname resolver. It can ping a
given range of IP addresses and resolve the host name of the remote system.
The features of SuperScan are as follows:
It scans any port range from a built-in list or any given range.
It performs ping scans and port scans using any IP range.
It modifies the port list and port descriptions using the built in editor.
It connects to any discovered open port using user-specified 'helper' applications.
It has the transmission speed control utility.
Answer B is incorrect. NBTscan is a scanner that scans IP networks for NetBIOS name information. It sends a NetBIOS status query to
each address in a supplied range and lists received information in human readable form. It displays IP address, NetBIOS computer name,
logged-in user name and MAC address of each responded host. NBTscan works in the same manner as nbtstat, but it operates on a range of
addresses instead of just one.