Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

--Which of the following grants users and systems a predetermined level of acces

ID: 3731490 • Letter: #

Question

--Which of the following grants users and systems a predetermined level of access?

Accountability

Authentication

Authorization

Assurance

--Which of the following is a behavioral control that can be used to safeguard against the loss of integrity?

Rotation of duties

Log analysis

Code testing

Digital signatures

--Which of the following is a type of access control that is defined by a policy and cannot be changed by the information owner?

Mandatory access control

Discretionary access control

Role-based access control

Rule-based access control

--Which of the following is the most common web application vulnerability?

Failure to validate output

Failure to validate input

Dynamic data validation

Static data validation

--Which of the following statements about symmetric key cryptography is not true?

Symmetric key cryptography uses one shared key.

Symmetric algorithms can provide confidentiality.

Symmetric algorithms can provide nonrepudiation and authenticity.

Symmetric key cryptography uses a single secret key.

--Which of the following business continuity plans focus on the immediate and near-term alternative workplace and business processes?

Response plans

Contingency plans

Recovery plans

Resumption plans

--Which of the following best describes full-scale testing?

Testing conducted at the enterprise level with a full simulation of a disaster with suspending all operations

Scenario-driven exercises but limited in scope to simulate a failure of a critical business function

A discussion-based exercise that does not involve deploying equipment or other resources

A systematic walkthrough of the procedures to determine disaster readiness

Explanation / Answer

ques) Which of the following grants users and systems a predetermined level of access?

Answer) Authorization

Explanation:Authorization involves the act of defining access-rights for subjects. An authorization policy specifies the operations that subjects are allowed to execute within a system.

Ques)Which of the following is a behavioral control that can be used to safeguard against the loss of integrity?

Answer) Digital signatures

Explanation: Digital signatures protect against the loss of integrity.

Ques)Which of the following is a type of access control that is defined by a policy and cannot be changed by the information owner?

Answer)Discretionary Access Control


Ques) Which of the following is the most common web application vulnerability?

Answer) Failure to validate input

Explanation: The most common web application security weakness is the failure to properly validate input coming from the client or from the environment before using it. This weakness leads to almost all of the major vulnerabilities
in web applications, such as cross site scripting, SQL injection, interpreter injection, locale/Unicode attacks, file system attacks, and buffer overflows.


Ques) Which of the following statements about symmetric key cryptography is not true?

Answer) Symmetric algorithms can provide confidentiality.

Let me know if you have any doubt.

ques) Which of the following business continuity plans focus on the immediate and near-term alternative workplace and business processes?

Answer) Contingency plans