- (Exam Topic 1)
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
Correct Answer:A
- (Exam Topic 1)
John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?
Correct Answer:B
- (Exam Topic 2)
Which of the following life cycle modeling activities establishes service relationships and message exchange paths?
Correct Answer:A
- (Exam Topic 2)
Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?
Correct Answer:A
- (Exam Topic 2)
Access control systems enable an authority to control access to areas and resources in a given physical facility or computer-based information system. Which of the following services provided by access control systems is used to determine what a subject can do?
Correct Answer:B
- (Exam Topic 2)
Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:BCD