Cryptographic technologies include data encryption standard (DES), Triple DES (3DES), and secure hash standard. Data encryption methods include virtual private networks (VPNs) and Internet Protocol security (IPsec). Escrowed encryption algorithms include Clipper.
17. For risk mitigation strategies, which of the following is
a. Apply security design principles.
b. Decrease an attacker’s motivation.
c. Implement security architectural design.
d. Establish nontechnical security controls.
The other three choices are proper and effective actions to take when the potential or actual cost for an attacker is too great, whether the attacker is a normal, casual, or determined, because they are stronger protection mechanisms. Both technical and nontechnical security controls can be used to limit the extent of the attack.
18. Which of the following actions are required to manage residual risk when new or enhanced security controls are implemented?
1. Eliminate some of the system’s vulnerabilities.
2. Reduce the number of possible threat-source/vulnerability pairs.
3. Add a targeted security control.
4. Reduce the magnitude of the adverse impact.
a. 1 and 2
b. 1 and 3
c. 2 and 4
d. 1, 2, 3, and 4
19. Which of the following ongoing security monitoring activities are more valuable in determining the effectiveness of security policies and procedures implementation?
a. Plans of action and milestones
b. Configuration management
c. Incident statistics
d. Network monitoring
20. Which of the following pairs of security objectives, rules, principles, and laws are in conflict with each other?
a. All-or-nothing access principle and the security perimeter rule
b. Least privilege principle and employee empowerment
c. File protection rules and access granularity principle
d. Trans-border data flows and data privacy laws
The all-or-nothing access principle means access is either to all objects or none at all. The security perimeter rule uses increasingly strong defenses as one approach the core information or resources sought. Both strengthen the security practices.