271. Out-of-band attacks against electronic authentication protocols include which of the following?
1. Password guessing attack
2. Replay attack
3. Verifier impersonation attack
4. Man-in-the-middle attack
a. 1 only
b. 3 only
c. 1 and 2
d. 3 and 4
In an out-of-band attack, the attacker alters the authentication protocol channel through session hijacking, verifier impersonation, or man-in-the-middle (MitM) attacks. In a verifier impersonation attack, the attacker impersonates the verifier and induces the claimant to reveal his secret token. The MitM attack is an attack on the authentication protocol run in which the attacker positions himself in between the claimant and verifier so that he can intercept and alter data traveling between them.
In a password guessing attack, an impostor attempts to guess a password in repeated logon trials and succeeds when he can log onto a system. In a replay attack, an attacker records and replays some part of a previous good protocol run to the verifier. Both password guessing and replay attacks are examples of in-band attacks. In an in-band attack, the attack is against an authentication protocol where the attacker assumes the role of a claimant with a genuine verifier or actively alters the authentication channel. The goal of the attack is to gain authenticated access or learn authentication secrets.
272. Which of the following information security control families requires a cross-cutting approach?
a. Access control
b. Audit and accountability
c. Awareness and training
d. Configuration management
273. Confidentiality controls include which of the following?
a. Cryptography
b. Passwords
c. Tokens
d. Biometrics
274. Which of the following is
a. Logical access controls
b. Role-based access controls
c. Reconstruction of transactions
d. System privileges
275. Which of the following is
a. Performance-based policy
b. Identity-based policy
c. Role-based policy
d. Rule-based policy
276. From security and safety viewpoints, which of the following does
a. Mutually exclusive roles
b. Reduced chances of collusion
c. Conflict-of-interest in tasks
d. Implicit constraints
277. Which of the following are compatible with each other in the pair in performing similar functions in information security?
a. SSO and RSO
b. DES and DNS
c. ARP and PPP
d. SLIP and SKIP