You are on page 1of 23

Solution Manual for Corporate Computer Security 4th

Edition by Boyle Panko ISBN 0133545199


9780133545197
Full download link at:
Solution manual: https://testbankpack.com/p/solution-manual-for-corporate-computer-
security-4th-edition-by-boyle-panko-isbn-0133545199-9780133545197/
Test bank: https://testbankpack.com/p/test-bank-for-corporate-computer-security-4th-edition-
by-boyle-panko-isbn-0133545199-9780133545197/
Corporate Computer Security, 4e (Boyle/Panko)
Chapter 5 Access Control

1) Which of the following is not one of the AAA controls?


A) Authentication
B) Auditing
C) Accuracy
D) Authorizations
Answer: C
Diff: 1
Question: 1a

2) ________ is the process of assessing the identity of each individual claiming to have
permission to use a resource.
A) Authorizations
B) Authentication
C) Accuracy
D) Auditing
Answer: B
Diff: 1
Question: 1b

3) ________ is the process of assessing the identity of each individual claiming to have
permission to use a resource.
A) Authorizations
B) Authentication
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 1
Question: 1b

4) ________ is the process of collecting information about the activities of each individual in log
files for immediate and later analysis.
A) Authorizations
B) Authentication
C) Accuracy

1
Copyright © 2015 Pearson Education, Inc.
D) Auditing
Answer: D
Diff: 1
Question: 1b

5) Authentication is the process of collecting information about the activities of each individual
in log files for immediate and later analysis.
Answer: FALSE
Diff: 1

6) Which of the following is one of the four bases for authentication credentials?
A) What you know
B) What you have
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 1

7) Two-factor authentication can be defeated if ________.


A) the user's computer is compromised
B) the attacker uses a man-in-the-middle attack
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 2
Question: 1c

8) Compared to access control based on individual accounts, RBAC is ________.


A) less prone to error
B) more expensive
C) Both A and B
D) Neither A nor B
Answer: A
Diff: 2
Question: 1g

9) In the military, departments do not have the ability to alter access control rules set by higher
authorities in ________.
A) policy-based access control
B) mandatory access control
C) discretionary access control
D) multilevel access control
Answer: B
Diff: 1
Question: 2a

10) In ________ the department has discretion over giving access to individuals, within policy

2
Copyright © 2015 Pearson Education, Inc.
standards set by higher authorities.
A) policy-based access control
B) mandatory access control
C) discretionary access control
D) delegated access control
Answer: C
Diff: 1
Question: 2a

3
Copyright © 2015 Pearson Education, Inc.
11) In military security, the term multilevel security means multifactor security.
Answer: FALSE
Diff: 2
Question: 2b

12) In military security, SBU documents are unclassified.


Answer: TRUE
Diff: 1
Question: 2c

13) All unattended exits should be locked to bar exit.


Answer: FALSE
Diff: 2
Question: 3c

14) In CobiT, entry must be ________.


A) justified
B) logged
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 2
Question: 3d

15) On loading docks, outgoing shipments should be separated from incoming shipments
________.
A) to ensure the segregation of duties
B) to avoid confusion
C) to reduce the risk of theft
D) All of the above
Answer: C
Diff: 2
Question: 3f

16) Which of the following is not one of the rules for working in secure areas?
A) Unsupervised work in secure areas should be avoided.
B) When no one is in a secure area, it should be locked and verified periodically.
C) No one should be allowed to work in secure areas for more than four hours in a row.
D) Electronic devices that can record or copy mass amounts of information should be forbidden
in secure areas.
Answer: C
Diff: 2
Question: 3h

4
Copyright © 2015 Pearson Education, Inc.
17) Which of the following should be forbidden in secure areas?
A) Cameras
B) USB flash drives
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 1
Question: 3h

18) Placing sensitive equipment in secure areas to minimize potential threats and damage is
called siting.
Answer: TRUE
Diff: 1
Question: 4a

19) ________ can be used to supply power during long power outages.
A) Uninterruptable power supplies
B) Electrical generators
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 4b

20) If a laptop needs to be taken off premises, ________.


A) it should first be logged out.
B) it should be logged in when returned
C) all sensitive information should be removed
D) All of the above
Answer: D
Diff: 2
Question: 4d

21) Buildings should be set back from streets and protected with rolling hill landscaping to
reduce threats from ________.
A) wireless eavesdropping
B) industrial espionage
C) casual observation
D) terrorism
Answer: D
Diff: 2
Question: 5a

5
Copyright © 2015 Pearson Education, Inc.
22) ________ is a social engineering trick where an intruder may follow an authorized user
through a door that the authorized user opens with an access device.
A) Shoulder surfing
B) Shadowing
C) Trailing
D) Piggybacking
Answer: D
Diff: 1
Question: 5b

23) It is illegal to go through a company's trash bins even if the trash bins are outside the
corporation.
Answer: FALSE
Diff: 1
Question: 5e

24) Most users who have access to servers use reusable passwords for authentication.
Answer: TRUE
Diff: 1
Question: 6a

25) PCs should require login screens with complex passwords.


Answer: TRUE
Diff: 1

26) Password cracking is usually done over the network by trying many passwords to log into an
account.
Answer: FALSE
Diff: 1
Question: 6b

27) Long passwords that use several types of keyboard characters are called ________
passwords.
A) complex
B) reusable
C) dictionary
D) one-time
Answer: A
Diff: 1
Question: 7a

6
Copyright © 2015 Pearson Education, Inc.
28) The book recommends that passwords be at least ________ characters long.
A) 6
B) 8
C) 20
D) 100
Answer: B
Diff: 1
Question: 9a

29) According to the book, r%Dv$ is a strong password.


Answer: FALSE
Diff: 3
Question: 9a

30) It is very important for testers to get permission before running a password cracking program
on their company's computers to check for weak passwords even if such testing is in their job
definitions.
Answer: TRUE
Diff: 1
Question: 9c

31) Users should select very long and complex passwords and use the same password at all sites
for auditability.
Answer: FALSE
Diff: 1
Question: 10a

32) Passwords should be changed frequently.


Answer: TRUE
Diff: 1
Question: 10c

33) Which of the following is true?


A) Human password resets are dangerous.
B) Automated password resets are dangerous.
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 10e

34) In high-risk environments, password reset risks are reduced by requiring the user's physical
presence.
Answer: TRUE
Diff: 2
Question: 10h

7
Copyright © 2015 Pearson Education, Inc.
35) Passwords offer reasonable security at reasonable cost and will likely continue to increase in
importance in the future.
Answer: FALSE
Diff: 1
Question: 11

36) A ________ card is an access card that has a built-in microprocessor and memory.
A) magnetic stripe
B) smart
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 12a

37) A magnetic stripe card is an access card that has a built-in microprocessor and memory.
Answer: FALSE
Diff: 1
Question: 12a

38) A ________ card stores authentication data.


A) magnetic stripe
B) smart
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 2
Question: 12a

39) A ________ is a small device with a display that has a number that changes frequently.
A) one-time-password token
B) USB token
C) magnetic stripe card
D) None of the above
Answer: A
Diff: 1
Question: 12b

40) A ________ is a small device that plugs into a standard computer port to identify the owner.
A) one-time-password token
B) USB token
C) magnetic stripe card
D) smart card
Answer: B
Diff: 1
Question: 12c

8
Copyright © 2015 Pearson Education, Inc.
41) A ________ does not require a special reader to be added to a PC for access control.
A) USB token
B) magnetic stripe card
C) smart card
D) All of the above
Answer: A
Diff: 2
Question: 12e

42) ________ can be much shorter than ________.


A) PINs, passwords
B) Passwords, PINs
C) There is no general length difference between passwords and PINs.
D) None of the above
Answer: A
Diff: 1

43) The major promise of biometrics is to replace reusable passwords.


Answer: TRUE
Diff: 1
Question: 14c

44) During enrollment, the scanner sends ________ to the authentication system.
A) scan data
B) key features
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 15a

45) The template is based on ________ generated during the enrollment scan.
A) scan data
B) key features
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 15d

9
Copyright © 2015 Pearson Education, Inc.
46) In biometric, a match occurs when a ________ meets the decision criteria.
A) set of key features
B) match index
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 1
Question: 16a

47) A false rejection occurs when a person is improperly matched to a template.


Answer: FALSE
Diff: 2
Question: 16b

48) A false acceptance occurs when a person is improperly matched to a template.


Answer: TRUE
Diff: 2
Question: 16b

49) For computer access, a false ________ means that a legitimate user is denied access to a
resource.
A) rejection
B) acceptance
C) Both A and B
D) Neither A nor B
Answer: A
Diff: 1
Question: 16d

50) From a security viewpoint, a false acceptance is always worse than a false rejection.
Answer: FALSE
Diff: 2
Question: 16f

51) For watch lists of criminals, a false ________ means that an innocent person is identified as a
criminal.
A) acceptance
B) rejection
C) Both A and B
D) Neither A nor B
Answer: A
Diff: 3
Question: 17a

10
Copyright © 2015 Pearson Education, Inc.
52) For watch lists of criminals, a false acceptance is worse than a false rejection from a security
viewpoint.
Answer: FALSE
Diff: 3
Question: 17b

53) Identification is the process where the verifier determines whether the supplicant is a
particular person that the supplicant claims who he or she is.
Answer: FALSE
Diff: 3
Question: 19a

54) Verification is the process where the verifier determines the identity of the supplicant.
Answer: FALSE
Diff: 2
Question: 19a

55) The verifier itself determines the identity of the supplicant in ________.
A) verification
B) identification
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 19a

56) Verification requires more matches against templates than does identification.
Answer: FALSE
Diff: 2
Question: 19b

57) Identification requires more matches against templates than does verification.
Answer: TRUE
Diff: 2
Question: 19b

58) Which is more likely to generate a false acceptance?


A) Verification
B) Identification
C) Both verification and identification are equally likely to generate a false acceptance.
D) None of the above
Answer: B
Diff: 3

11
Copyright © 2015 Pearson Education, Inc.
59) ________ is a form of identification that identifies a person as being a member of a group.
A) RBAC
B) Watch list matching
C) Group ID matching
D) Group acceptance
Answer: B
Diff: 1
Question: 19d

60) When an attacker deliberately attempts to fool the system, this is called ________.
A) deception
B) a false acceptance
C) a false rejection
D) All of the above.
Answer: A
Diff: 1
Question: 21a

61) Fingerprint scanning, which is often deceived, may be acceptable for entry into a non-
sensitive supplies cabinet.
Answer: TRUE
Diff: 2
Question: 21b

62) Because fingerprint scanning is often deceived, it should never be used as a security
measure.
Answer: FALSE
Diff: 3
Question: 21b

63) Which of the following statements accurately describes fingerprint recognition?


A) Fingerprint recognition scanners are very expensive.
B) Fingerprint recognition is easily deceived.
C) Fingerprint recognition is rarely used.
D) All of the above
Answer: B
Diff: 2
Question: 22a

64) Fingerprint recognition is easily deceived.


Answer: TRUE
Diff: 1
Question: 22b

12
Copyright © 2015 Pearson Education, Inc.
65) Fingerprint recognition should be used as a security measure for access to ________.
A) a non-essential supply cabinet
B) a notebook containing sensitive information
C) Both A and B
D) Neither A nor B
Answer: A
Diff: 2
Question: 22c

66) Which of the following statements accurately describes iris recognition?


A) Iris recognition has high FARs.
B) Iris recognition technology is expensive.
C) Iris recognition scans the eye with lasers.
D) All of the above
Answer: B
Diff: 2
Question: 22d

67) Iris recognition technology is ________ and ________.


A) expensive, has low FARs
B) expensive, has high FARs
C) inexpensive, has low FARs
D) inexpensive, has high FARs
Answer: A
Diff: 2
Question: 22d

68) Iris scanning usually is done surreptitiously.


Answer: FALSE
Diff: 2
Question: 23a

69) Hand geometry recognition is used heavily for ________.


A) PC access
B) watch list access
C) door access
D) server access
Answer: C
Diff: 1
Question: 23c

13
Copyright © 2015 Pearson Education, Inc.
70) The most widely used form of biometrics is ________.
A) retinal scanning
B) iris scanning
C) fingerprint scanning
D) face recognition
Answer: C
Diff: 1
Question: 23f

71) The strongest form of authentication is ________.


A) biometrics
B) cryptographic authentication
C) reusable passwords
D) smart cards
Answer: B
Diff: 1
Question: 24a

72) Biometric authentication is the strongest form of authentication.


Answer: FALSE
Diff: 2
Question: 24a

73) A firm can be its own certificate authority for internal users.
Answer: TRUE
Diff: 1
Question: 24c

74) A private key/public key pair is usually created by the ________.


A) client
B) PKI server
C) Both A and B
D) Neither A nor B
Answer: A
Diff: 2
Question: 24e

75) CAs distribute public keys ________.


A) in digital certificates
B) only in ways using encryption for confidentiality
C) Both A and B
D) Neither A nor B
Answer: A
Diff: 2
Question: 24f

14
Copyright © 2015 Pearson Education, Inc.
76) In the context of PKI, ________ is the process of accepting public keys and providing new
digital certificates to the users.
A) provisioning
B) reflection
C) coordination
D) certification
Answer: A
Diff: 1
Question: 24g

77) The ________ authentication problem is that unless individuals are carefully vetted before
being allowed in a system, imposters can simply enroll through social engineering.
A) core
B) prime
C) final
D) human
Answer: B
Diff: 1
Question: 24h

78) Giving a user permissions to use a certain resource is ________.


A) authentication
B) authorization
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 1
Question: 25a

79) Authorizations are also called ________.


A) permissions
B) verifications
C) Both A and B
D) Neither A nor B
Answer: A
Diff: 1
Question: 25b

80) The principle of ________ states that each person should only get the permissions that he or
she absolutely needs to do his or her job.
A) appropriate authorizations
B) least permissions
C) minimization
D) All of the above.
Answer: B
Diff: 1
Question: 25c

15
Copyright © 2015 Pearson Education, Inc.
81) When assigning initial permissions, it is good to add more permissions than strictly
necessary and then remove permissions if appropriate.
Answer: FALSE
Diff: 2
Question: 25d

82) When assigning initial permissions, it is good to give the least permissions believed to be
necessary and then add permissions if appropriate.
Answer: TRUE
Diff: 2
Question: 25d

83) If a firewall lacks the processing power to handle incoming traffic, it will drop any packets it
cannot process. This is ________.
A) a security failure
B) failing safely
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 3
Question: 25f

84) ________ record(s) and analyzes what a person or program actually did.
A) Authentication
B) Authorizations
C) Auditing
D) All of the above
Answer: C
Diff: 1
Question: 26a

85) Which of the following statements is true about log files?


A) Log files should be read regularly.
B) External auditing should be conducted periodically.
C) Automatic alerts should be established.
D) All of the above
Answer: D
Diff: 2
Question: 26d

16
Copyright © 2015 Pearson Education, Inc.
86) Which of the following is not one of the devices in RADIUS central authentication?
A) The supplicant
B) The verifier
C) The authenticator
D) The RADIUS central authentication server
Answer: B
Diff: 2
Question: 27a

87) In Kerberos, the ________ is the supplicant's proof that it has already authenticated itself
with the Kerberos Server.
A) ticket granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
Answer: A
Diff: 2
Question: 28a

88) In Kerberos, the ________ is an encrypted session key that only the verifier can decrypt.
A) ticket granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 3
Question: 28a

89) In Kerberos, the ________ is sent from the Kerberos server to the supplicant.
A) ticket granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 2
Question: 28a

90) In Kerberos, the ________ is sent from the Kerberos server to the verifier.
A) ticket granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
Answer: D
Diff: 3
Question: 28a

17
Copyright © 2015 Pearson Education, Inc.
91) The ________ gives the verifier a symmetric session key.
A) ticket-granting ticket
B) service ticket
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 28b

92) In Kerberos, the Kerberos server sends the Service Ticket directly to the supplicant rather
than directly to the verifier.
Answer: TRUE
Diff: 2
Question: 28c

93) In Kerberos, the verifier is explicitly notified that the supplicant has been authenticated.
Answer: FALSE
Diff: 3
Question: 28d

94) In directory servers, information is organized ________.


A) hierarchically
B) rhizomatically
C) relationally
D) None of the above
Answer: A
Diff: 1
Question: 29a

95) In directory servers, ________.


A) there can only be one O in a directory server
B) there can only be one OU in a directory server
C) Both A and B
D) Neither A nor B
Answer: A
Diff: 1
Question: 29b

96) Directory servers can hold information about ________.


A) people
B) computers
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 1
Question: 29c

18
Copyright © 2015 Pearson Education, Inc.
97) LDAP can be used ________.
A) to update information in the directory server
B) to retrieve data from the directory server
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 2
Question: 30

98) ________ often get their authentication information from ________.


A) Directory servers, central authentication servers
B) Central authentication servers, metadirectory servers
C) Central authentication servers, directory servers
D) Metadirectory servers, central authentication servers
Answer: C
Diff: 2
Question: 31

99) Microsoft's directory server product is ________.


A) Kerberos
B) Active Directory
C) LDAP
D) MS Directory
Answer: B
Diff: 1
Question: 32a

100) In Active Directory, a domain controller contains ________.


A) a RADIUS authentication server program
B) an Active Directory database
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 32c

101) A Microsoft domain can have multiple domain controllers.


Answer: TRUE
Diff: 1
Question: 32d

102) Microsoft domains can be organized into trees, and trees can be organized into forests.
Answer: TRUE
Diff: 2
Question: 32g

19
Copyright © 2015 Pearson Education, Inc.
103) Replication between a domain controller in a child domain and a domain controller in its
parent domain is ________.
A) total
B) partial
C) nonexistent
D) intransitive
Answer: B
Diff: 2
Question: 32i

104) If Directory Server A trusts Directory Server B and Directory Server B trusts Directory
Server C then Directory Server A MUST trust Directory Server C.
Answer: FALSE
Diff: 3
Question: 33a

105) If Directory Server A trusts Directory Server B, Directory Server B trusts Directory Server
C, and Directory Server A trusts Directory Server C, this is ________ trust.
A) Mutual
B) One-way
C) Transitive
D) Intransitive
Answer: C
Diff: 1
Question: 33b

106) If Directory Server A trusts Directory Server Band Directory Server B trusts Directory
Server A, this is ________ trust.
A) Mutual
B) One-way
C) Transitive
D) Intransitive
Answer: A
Diff: 1
Question: 33b

107) Directory servers from different vendors are synchronized through ________.
A) LDAP
B) central authentication servers
C) AD servers
D) None of the above
Answer: D
Diff: 2
Question: 34a

20
Copyright © 2015 Pearson Education, Inc.
108) ________ servers synchronize directory servers from different vendors.
A) Synchronization
B) LDAP
C) Metadirectory
D) Central authentication
Answer: C
Diff: 1
Question: 34b

109) In federated identity management, firms do not query one another's identity management
databases.
Answer: TRUE
Diff: 1
Question: 35a

110) In federated identity management, firms ________.


A) query one another's identity management databases
B) send assertions to one another
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 35b

111) A(n) ________ is a statement from Firm A that Firm B should accept as true if Firm B
trusts Firm A.
A) certification
B) assertion
C) certificate
D) attribute
Answer: B
Diff: 1
Question: 35e

112) A security assertion may contain ________.


A) authenticity information
B) attributes, such as spending limits for purchasers
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 2
Question: 35f

113) The main standards used by firms to send security assertions to one another is LDAP.
Answer: FALSE
Diff: 1
Question: 35g
21
Copyright © 2015 Pearson Education, Inc.
114) The standard for sending security assertions is ________.
A) LDAP
B) XML
C) SAML
D) None of the above
Answer: C
Diff: 1
Question: 35g

115) XML makes SAML platform-dependent.


Answer: FALSE
Diff: 2
Question: 35h

116) ________ is the centralized policy based management of all information required for access
to corporate systems by people, machines, programs, or other resources.
A) Directory service
B) Meta-directory service
C) Identity management
D) Meta-identity management
Answer: C
Diff: 1
Question: 36a

117) Which of the following are benefits of using identity management?


A) Reduced costs
B) Centralized auditing of all an employee's access permission across a firm
C) Both A and B
D) Neither A nor B
Answer: C
Diff: 2
Question: 36b

118) ________ allows a user to authenticate him or herself to the identity management server
once; thereafter, whenever the user asks for access to another server, no additional logins are
required.
A) RSO
B) SSO
C) TSO
D) None of the above
Answer: B
Diff: 1
Question: 36a

22
Copyright © 2015 Pearson Education, Inc.
119) ________ is possible today.
A) Single sign-on
B) Reduced sign-on
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 36e

120) A(n) ________ is the set of attributes about a person or resource that must be revealed in a
particular context.
A) template
B) subtemplate
C) identity
D) None of the above
Answer: C
Diff: 2
Question: 36f

121) As far as possible, identities should be managed by people closest to the situation.
Answer: TRUE
Diff: 2
Question: 37b

122) Self-service identity management should be used to change a ________ in the identity
database.
A) password
B) telephone number
C) Both A and B
D) Neither A nor B
Answer: B
Diff: 2
Question: 37d

123) Identity management is really just another form of risk management.


Answer: TRUE
Diff: 1
Question: 38a

124) The amount of money companies should spend on identity management can be measured
through risk analysis.
Answer: TRUE
Diff: 1
Question: 38c

23
Copyright © 2015 Pearson Education, Inc.

You might also like