277. a. A single sign-on (SSO) technology allows a user to authenticate once and then access all the resources the user is authorized to use. A reduced sign-on (RSO) technology allows a user to authenticate once and then access many, but not all, of the resources the user is authorized to use. Hence, SSO and RSO perform similar functions.
The other three choices do not perform similar functions. Data encryption standard (DES) is a symmetric cipher encryption algorithm. Domain name system (DNS) provides an Internet translation service that resolves domain names to Internet Protocol (IP) addresses and vice versa. Address resolution protocol (ARP) is used to obtain a node’s physical address. Point-to-point protocol (PPP) is a data-link framing protocol used to frame data packets on point-to-point lines. Serial line Internet protocol (SLIP) carries Internet Protocol (IP) over an asynchronous serial communication line. PPP replaced SLIP. Simple key management for Internet protocol (SKIP) is designed to work with the IPsec and operates at the network layer of the TCP/IP protocol, and works very well with sessionless datagram protocols.
278. How is identification different from authentication?
a. Identification comes after authentication.
b. Identification requires a password, and authentication requires a user ID.
c. Identification and authentication are the same.
d. Identification comes before authentication.
279. Accountability is
a. Identification
b. Availability
c. Authentication
d. Auditing
280. Which of the following statements is true about mandatory access control?
a. It does not use sensitivity levels.
b. It uses tags.
c. It does not use security labels.
d. It reduces system performance.
281. What control is referred to when an auditor reviews access controls and logs?
a. Directive control
b. Preventive control
c. Corrective control
d. Detective control
282. Logical access controls are a technical means of implementing security policy decisions. It requires balancing the often-competing interests. Which of the following trade-offs should receive the highest interest?
a. User-friendliness
b. Security principles
c. Operational requirements
d. Technical constraints
283. Which of the following types of passwords is counterproductive?
a. System-generated passwords
b. Encrypted passwords
c. Nonreusable passwords
d. Time-based passwords