300. What is a control to prevent an unauthorized user from starting an alternative operating system?
a. Shadow password
b. Encryption password
c. Power-on password
d. Network password
301. The concept of least privilege is based on which of the following?
a. Risk assessment
b. Information flow enforcement
c. Access enforcement
d. Account management
302. Which of the following is the primary technique used by commercially available intrusion detection and prevention systems (IDPS) to analyze events to detect attacks?
a. Signature-based IDPS
b. Anomaly-based IDPS
c. Behavior-based IDPS
d. Statistical-based IDPS
303. For electronic authentication, which of the following is an example of a passive attack?
a. Eavesdropping
b. Man-in-the-middle
c. Impersonation
d. Session hijacking
A man-in-the-middle (MitM) attack is incorrect because it is an active attack on the authentication protocol run in which the attacker positions himself between the claimant and verifier so that he can intercept and alter data traveling between them.
Impersonation is incorrect because it is an attempt to gain access to a computer system by posing as an authorized user. It is the same as masquerading, spoofing, and mimicking.
Session hijacking is incorrect because it is an attack that occurs during an authentication session within a database or system. The attacker disables a user’s desktop system, intercepts responses from the application, and responds in ways that probe the session. Man-in-the-middle, impersonation, and session hijacking are examples of active attacks. Note that MitM attacks can be passive or active depending on the intent of the attacker because there are mild MitM or strong MitM attacks.
304. Which of the following complementary strategies to mitigate token threats raise the threshold for successful attacks?
a. Physical security mechanisms
b. Multiple security factors
c. Complex passwords
d. System and network security controls
Physical security mechanisms are incorrect because they may be employed to protect a stolen token from duplication. Physical security mechanisms can provide tamper evidence, detection, and response.