The Bell and Lapaluda Access Control model is a form of:
- MAC
- DAC
- RBAC
- ABAC
MAC
In which cloud model does the cloud customer have LESS responsibility over the infrastructure?
SaaS
Which of these tools is commonly used to crack passwords?
John The Ripper
Which type of attack will most effectively provide privileged access (root access in Unix/Linux platforms) to a computer while hiding its presence?
Rootkits
Which devices would be more effective in detecting an intrusion into a network?
NIDS
Which of these would be the best option if a network administrator needs to control access to a network?
NAC
In which of the following phases of an Incident Recovery Plan are incident responses prioritized?
Detection and Analysis
Which of the following are NOT types of security controls?
Storage Controls
According to the canon “Provide diligent and competent service to principals”, (ISC)² professionals are to:
Avoid apparent or actual conflicts of interest
Which of the following is NOT a protocol of the OSI Level 3?
SNMP
Which of the following is a public IP?
13.16.123.1
Which port is used to secure communication over the web (HTTPS)?
443
The SMTP protocol operates at OSI Level:
7
The address 8be2:4382:8d84:7ce2:ec0f:3908:d29a:903a is an:
IPv6 address
Which of these is NOT a change management component?
Governance
Which of these is the PRIMARY objective of a Disaster Recovery Plan?
What is an effective way of hardening a system?
Patch the system
Which access control model can grant access to a given object based on complex rules?
ABAC
What type of security control is the biometric reader that grants access to the data center building?
Physical Control