d. Recovery services
69. The security services that provide for availability security objectives also provide for which of the following security objectives?
a. Integrity
b. Confidentiality
c. Accountability
d. Assurance
The primary availability services are those that directly impact the ability of the system to maintain operational effectiveness. One aspect of maintaining operational effectiveness is protection from unauthorized changes or deletions by defining authorized access and enforcing access controls. Operational effectiveness is also maintained by detecting intrusions, detecting loss of wholeness, and providing the means of returning to a secure state.
The services that provide for availability also provide for integrity. This is because maintaining or restoring system integrity is an essential part of maintaining system availability.
By definition, integrity is the property that protected and sensitive data has not been modified or deleted in an unauthorized and undetected manner. By definition, availability means ensuring timely and reliable access to and use of data and information by authorized users. How is the data available to authorized users if it was deleted or destroyed?
The security services provided to fulfill the security objectives of availability, confidentiality, accountability, and assurance together have nothing in common.
70. Web spoofing using the man-in-the-middle attack is an example of which of the following?
a. Browser-oriented attacks
b. Server-oriented attacks
c. Network-oriented attacks
d. User-oriented attacks
71. To mitigate the risks of using active content, which of the following is an example of a technical safeguard?
a. Filters
b. Incident response handling
c. Security policy
d. Risk analysis
72. To mitigate the risks of using active content, which of the following is an example of a technical safeguard?
a. Security audit
b. Evaluated technology
c. Application settings
d. Software cages
73. To mitigate the risks of using active content, which of the following is an example of a technical safeguard?
a. Version control
b. Digital signatures
c. Patch management
d. System isolation
74. To mitigate the risks of using active content, which of the following is an example of a technical safeguard?
a. Virtualization
b. Isolate proprietary program components
c. Proof carrying code
d. Isolate tightly bounded programs