b. Server-oriented attacks
c. Network-oriented attacks
d. User-oriented attacks
180. Which of the following is an example of a single point-of-failure?
a. Security administration
b. Single sign-on
c. Multiple passwords
d. Network changes
The other three choices are examples of multiple points-of-failure, where many things can go wrong in many places by many individuals. Every time an employee is terminated or parts of the network changed, the security administrator must deactivate all the employee’s passwords and reconfigure the network. Here, the risk is spread out, not concentrated.
181. Which of the following is an example of a second line-of-defense in attack recognition?
a. Firewall
b. Attack detection software
c. Password
d. Internal controls
The line-of-defenses are security mechanisms for limiting and controlling access to and use of computer system resources. They exercise a directing or restraining influence over the behavior of individuals and the content of computer systems. The line-of-defenses form a core part of defense-in-depth strategy or security-in-depth strategy.
182. Which of the following physical security mechanisms provides a first line-of-defense for a data center?
a. Interior areas within a building
b. Exterior walls of a building
c. Perimeter barriers outside a building
d. Ceilings of a building
The line-of-defenses are security mechanisms for limiting and controlling access to and use of computer system resources. They exercise a directing or restraining influence over the behavior of individuals and the content of computer systems. The line-of-defenses form a core part of defense-in-depth strategy or security-in-depth strategy.
183. Which of the following is the correct approach for an information system to separate user functionality from management functionality?
a. Application partitioning
b. Boundary protection
c. Security parameters
d. Controlled interfaces
Boundary protection is incorrect because it means controlling communications at the external boundary of an information system and at key internal boundaries within the system. The organization physically allocates publicly accessible information system components (e.g., public Web servers) to separate sub-networks with separate, physical network interfaces.
Security parameters are incorrect because they include security labels and markings, which are associated with information exchanged between information systems.