d. Access control lists (ACLs)
327. For electronic authentication protocol threats, which of the following are assumed to be physically able to intercept authentication protocol runs?
a. Eavesdroppers
b. Subscriber impostors
c. Impostor verifiers
d. Hijackers
Subscriber impostors are incorrect because they need only normal communications access to verifiers or relying parties. Impostor verifiers are incorrect because they may have special network capabilities to divert, insert, or delete packets. But, in many cases, such attacks can be mounted simply by tricking subscribers with incorrect links or e-mails or on Web pages, or by using domain names similar to those of relying parties or verifiers. Therefore, the impostors do not necessarily need to have any unusual network capabilities. Hijackers are incorrect because they must divert communications sessions, but this capability may be comparatively easy to achieve today when many subscribers use wireless network access.
328. Which of the following is
a. System scanning attacks
b. Denial-of-service attacks
c. System penetration attacks
d. IP address spoofing attacks
A system scanning attack occurs when an attacker probes a target network or system by sending different kinds of packets. Denial-of-service attacks attempt to slow or shut down targeted network systems or services. System penetration attacks involve the unauthorized acquisition and/or alteration of system privileges, resources, or data.
329. In-band attacks against electronic authentication protocols include which of the following?
a. Password guessing
b. Impersonation
c. Password guessing and replay
d. Impersonation and man-in-the-middle
330. Which of the following access control policies or models provides a straightforward way of granting or denying access for a specified user?
a. Role-based access control (RBAC)
b. Access control lists (ACLs)
c. Mandatory access control (MAC)
d. Discretionary access control (DAC)
331. What is impersonating a user or system called?
a. Snooping attack
b. Spoofing attack
c. Sniffing attack
d. Spamming attack