The other three choices are examples of proactive (preventive) countermeasures. Integrity checkers keep cryptographic hashes of known good instances of files so that integrity comparisons can be made at any time. Host firewalls enforce rules that define the manner in which specific applications may use the network. Stateful firewalls keep track of network connections and monitor their state.
161. Which of the following is an effective means of preventing and detecting computer viruses coming from outside into a network?
a. Install an antivirus program on the network.
b. Install an antivirus program on each personal computer.
c. Certify all removable media disks prior to their use.
d. Train all employees about potential risks.
162. All the following are examples of measures to defend against computer viruses
a. Access controls
b. Audit trails
c. Passwords
d. Least privilege principle
163. Which of the following security principle balances various variables such as cost, benefit, effort, value, time, tools, techniques, gain, loss, risks, and opportunities involved in a successful compromise of security features?
a. Compromise recording
b. Work factor
c. Psychological acceptability
d. Least common mechanism
The principle of compromise recording means computer or manual records and logs should be maintained so that if a compromise does occur, evidence of the attack is available. The recorded information can be used to better secure the host or network in the future and can assist in identifying and prosecuting attackers.
The principle of psychological acceptability encourages the routine and correct use of protection mechanisms by making them easy to use, thus giving users no reason to attempt to circumvent them. The security mechanisms must match the user’s own image of protection goals.
The principle of least common mechanism requires the minimal sharing of mechanisms either common to multiple users or depended upon by all users. Sharing represents possible communications paths between subjects used to circumvent security policy.
164. Certification and accreditation needs must be considered in all the following phases of system development life cycle
a. Initiation
b. Development/acquisition
c. Implementation
d. Operation/maintenance