243. Passwords can be stored safely in which of the following places?
a. Initialization file
b. Script file
c. Password file
d. Batch file
244. Which of the following is
a. Password sharing
b. Password guessing
c. Password capturing
d. Password spoofing
The other three choices are incorrect because they are the most commonly used methods to gain unauthorized access to computer systems. Password sharing allows an unauthorized user to have the system access and privileges of a legitimate user, with the legitimate user’s knowledge and acceptance. Password guessing occurs when easy-to-use or easy-to-remember codes are used and when other users know about them (e.g., hobbies, sports, favorite stars, and social events). Password capturing is a process in which a legitimate user unknowingly reveals the user’s login ID and password. This may be done through the use of a Trojan horse program that appears to the user as a legitimate login program; however, the Trojan horse program is designed to capture passwords.
245. What are the Bell-LaPadula access control model and mandatory access control policy examples of?
a. Identity-based access controls (IBAC)
b. Attribute-based access controls (ABAC)
c. Role-based access controls (RBAC)
d. Rule-based access controls (RuBAC)
246. Which of the following security solutions for access control is simple to use and easy to administer?
a. Passwords
b. Cryptographic tokens
c. Hardware keys
d. Encrypted data files
Passwords is an incorrect answer because they do require some amount of security administrative work such as setting up the account and helping users when they forget passwords. Passwords are simple to use but hard to administer.
Cryptographic tokens is an incorrect answer because they do require some amount of security administrative work. Tokens need to be assigned, programmed, tracked, and disposed of.
Encrypted data files is an incorrect answer because they do require some amount of security administrative work. Encryption keys need to be assigned to the owners for encryption and decryption purposes.
247. Cryptographic authentication systems must specify how the cryptographic algorithms will be used. Which of the following authentication systems would reduce the risk of impersonation in an environment of networked computer systems?
a. Kerberos-based authentication system
b. Password-based authentication system
c. Memory token-based authentication system
d. Smart token-based authentication system