Home
6.
Multi-factor authentication is most closely related to which of the following security design principles?
  • A.
    Separation of Duties.
  • B.
    Defense in depth.
  • C.
    Complete mediation.
  • D.
    Open design.
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Having more than one way of authentication provides for a layered defense which is the premise of the defense in depth security design principle.
Report
Name Email  
7.
Audit logs can be used for all of the following EXCEPT
  • A.
    providing evidentiary information.
  • B.
    assuring that the user cannot deny their actions.
  • C.
    detecting the actions that were undertaken.
  • D.
    preventing a user from performing some unauthorized operations.
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Audit log information can be a detective control (providing evidentiary information), a deterrent control when the users knows that they are being audited but it cannot prevent any unauthorized actions. When the software logs user actions, it also provides non-repudiation capabilities because the user cannot deny their actions.
Report
Name Email  
8.
Organizations often pre-determine the acceptable number of user errors before recording them as security violations. This number is otherwise known as:
  • A.
    Clipping level.
  • B.
    Known Error.
  • C.
    Minimum Security Baseline.
  • D.
    Maximum Tolerable Downtime.
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
The pre-determined number of acceptable user errors before recording the error as a potential security incident is referred to as clipping level. For example, if the number of allowed failed login attempts before the account is locked out is 3, then the clipping level for authentication attempts is 3.
Report
Name Email  
9.
A security principle that maintains the confidentiality, integrity and availability of the software and data, besides allowing for rapid recovery to the state of normal operations, when unexpected events occur is the security design principle of
  • A.
    defense in depth.
  • B.
    economy of mechanisms.
  • C.
    fail secure
  • D.
    psychological acceptability
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Fail secure principle prescribes that access decisions must be based on permission rather than exclusion. This means that the default situation is lack of access, and the protection scheme identifies conditions under which access is permitted. The alternative, in which mechanisms attempt to identify conditions under which access should be refused, presents the wrong psychological base for secure system design.
A design or implementation mistake in a mechanism that gives explicit permission tends to fail by refusing permission, a safe situation, since it will be quickly detected. On the other hand, a design or implementation mistake in a mechanism that explicitly excludes access tends to fail by allowing access, a failure which may go unnoticed in normal use. This principle applies both to the outward appearance of the protection mechanism and to its underlying implementation.
Report
Name Email  
10.
Requiring the end user to accept an ‘AS-IS’ disclaimer clause before installation of your software is an example of risk
  • A.
    avoidance.
  • B.
    mitigation.
  • C.
    transference.
  • D.
    acceptance.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
When an "AS-IS" disclaimer clause is used, the risk is transferred from the publisher of the software to the user of the software.
Report
Name Email