Which definition among those given below best describes a covert channel?
Answer : B
A covert channel is described as: 'any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy.' Essentially, it is a method of communication that is not part of an actual computer system design, but can be used to transfer information to users or system processes that normally would not be allowed access to the information.
Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
Answer : A
The teardrop attack uses overlapping packet fragments to confuse a target system and cause the system to reboot or crash.
_________ ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at.
Answer : A
In computer security, mandatory access control (MAC) is a kind of access control, defined by the TCSEC as 'a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity.'
Access control is often implemented through the use of MAC address filtering on wireless Access Points. Why is this considered to be a very limited security measure?
Answer : C
Peter is a Linux network admin. As a knowledgeable security consultant, he turns to you to look for help on a firewall. He wants to use Linux as his firewall and use the latest freely available version that is offered. What do you recommend?Select the best answer.
Answer : B
User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
Answer : B
http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001030----000-.html
You visit a website to retrieve the listing of a company's staff members. But you can not find it on the website. You know the listing was certainly present one year before. How can you retrieve information from the outdated website?
Answer : B
Archive.org mirrors websites and categorizes them by date and month depending on the crawl time. Archive.org dates back to 1996, Google is incorrect because the cache is only as recent as the latest crawl, the cache is over-written on each subsequent crawl. Download the website is incorrect becausethat's the same as what you see online. Visiting customer partners websites is just bogus. The answer is then Firmly, C, archive.org