1) What is a security risk of allowing mobile code to execute on a target machin
ID: 3834362 • Letter: 1
Question
1) What is a security risk of allowing mobile code to execute on a target machine?
The time delay from when it is downloaded and executed could initiate an asynchronous attack.
It will move or overwrite the original boot process so that every time the machine is powered on, the code will be activated.
Malware may be included in the downloaded code and infect the target machine.
It will contaminate files that contain computer code, especially .exe and .com
files.
2) In which access control mechanism does the operating system determine the access
control permissions for subjects?
Role-based
Mandatory
Token-based
Discretionary
3) How does multi-factor authentication improve security?
It denies attacker multiple times.
By using biometrics, no other person can
authenticate.
By using a combination of authentications, it is
more difficult to gain access by pretending to be an authorized user.
It restricts users to smaller spaces.
4) Map the definition to the corresponding layer of the OSI model.
A. Application Layer 1. Responsible for co-ordinating communication between systems
B. Presentation Layer 2. Responsible for putting data packets into data frames from the layer below
C. Session Layer 3. Responsible for availability of intended communication partner
D. Transport Layer 4. Responsible for transmitting data from node to node with switching and routing technologies
E. Network Layer 5. Responsible for negotiating data transfer syntax
F. Datalink Layer 6. Responsible for multiplexing upper-layer applications
G. Physical Layer 7. Responsible for providing hardware means for sending and receiving data
A 7, B 5, C 1, D 6, E 4, F 2, G 3
A 3, B 1, C 5, D 6, E 4, F 2, G 7
A 3, B 5, C 1, D 4, E 6, F 2, G 7
A 3, B 5, C 1, D 6, E 4, F 2, G 7
5) Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?
False negative
True positive
False positive
True negative
6) Which of the following answers refers to a concept of having more than one person required to complete a given task?
Separation of duties
Acceptable use policy
Multifactor authentication
Privacy policy
The time delay from when it is downloaded and executed could initiate an asynchronous attack.
It will move or overwrite the original boot process so that every time the machine is powered on, the code will be activated.
Malware may be included in the downloaded code and infect the target machine.
It will contaminate files that contain computer code, especially .exe and .com
files.
2) In which access control mechanism does the operating system determine the access
control permissions for subjects?
Role-based
Mandatory
Token-based
Discretionary
Explanation / Answer
2) In which access control mechanism does the operating system determine the access
control permissions for subjects?
Discretionary
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.