Which of the following is NOT an advantage that TACACS+ has
A. Event logging
B. Use of two-factor password authentication
C. User has the ability to change his password
D. Ability for security tokens to be resynchronized
Which of the following best describes signature-based
A. Compare source code, looking for events or sets of events
that could cause damage to asystem or network.
B. Compare system activity for the behaviour patterns of new
C. Compare system activity, looking for events or sets of
events that match a predefined pattern of events that describe a known attack.
D. Compare network nodes looking for objects or sets of
objects that match a predefined patternof objects that may describe a known attack.
Youve decided to authenticate the source who initiated a
particular transfer while ensuring integrity of the data being transferred. You can do this by:
A. Having the sender encrypt the message with his private
B. Having the sender encrypt the hash with his private key.
C. Having the sender encrypt the message with his symmetric
D. Having the sender encrypt the hash with his public key.
Many approaches to Knowledge Discovery in Databases (KDD)
are used to identify valid and useful patterns in data. This is an evolving field of study
that includes a variety of automated analysis solutions such as Data Mining. Which of the
following is not an approach used by KDD?
A. ProbabilisticAnswer: B
Which of the following issues is not addressed by digital
C. data integrity