260. Intrusion detection refers to the process of identifying attempts to penetrate a computer system and gain unauthorized access. Which of the following assists in intrusion detection?
a. Audit records
b. Access control lists
c. Security clearances
d. Host-based authentication
Access control lists refer to a register of users who have been given permission to use a particular system resource and the types of access they have been permitted. Security clearances are associated with a subject (e.g., person and program) to access an object (e.g., files, libraries, directories, and devices). Host-based authentication grants access based upon the identity of the host originating the request, instead of the identity of the user making the request. The other three choices have no facilities to record access activity and therefore cannot assist in intrusion detection.
261. Which of the following is the technique used in anomaly detection in intrusion detection systems where user and system behaviors are expressed in terms of counts?
a. Parametric statistics
b. Threshold detection measures
c. Rule-based measures
d. Nonparametric statistics
Statistical measures include parametric and nonparametric. In parametric measures the distribution of the profiled attributes is assumed to fit a particular pattern. In the nonparametric measures the distribution of the profiled attributes is “learned” from a set of historical data values, observed over time.
Rule-based measures are similar to nonparametric statistical measures in that observed data defines acceptable usage patterns but differs in that those patterns are specified as rules, not numeric quantities.
262. Which of the following is
a. Iris-detection technology
b. Voice technology
c. Hand technology
d. Fingerprint technology
263. Which of the following is true about biometrics?
a. Least expensive and least secure
b. Most expensive and least secure
c. Most expensive and most secure
d. Least expensive and most secure
264. Which of the following is preferable for environments at high risk of identity spoofing?
a. Digital signature
b. One-time passwords
c. Digital certificate
d. Mutual authentication
265. Which of the following is