Domain 1: Access Control
Scenario-Based Questions, Answers, and Explanations
Sources and References
Domain 2: Telecommunications and Network
Security
Traditional Questions, Answers, and Explanations
Scenario-Based Questions, Answers, and Explanations
Sources and References
Domain 3: Information Security Governance and
Risk Management
Traditional Questions, Answers, and Explanations
Scenario-Based Questions, Answers, and Explanations
Sources and References
Domain 4: Software Development Security
Traditional Questions, Answers, and Explanations
Scenario-Based Questions, Answers, and Explanations
Sources and References
Domain 5: Cryptography
Traditional Questions, Answers, and Explanations
, Scenario-Based Questions, Answers, and Explanations
Sources and References
Domain 6: Security Architecture and Design
Traditional Questions, Answers, and Explanations
Scenario-Based Questions, Answers, and Explanations
Sources and References
Domain 7: Security Operations
Traditional Questions, Answers, and Explanations
Scenario-Based Questions, Answers, and Explanations
Sources and References
Domain 8: Business Continuity and Disaster
Recovery Planning
Traditional Questions, Answers, and Explanations
Scenario-Based Questions, Answers, and Explanations
Sources and References
Domain 9: Legal, Regulations, Investigations, and
Compliance
Traditional Questions, Answers, and Explanations
Scenario-Based Questions, Answers, and Explanations
Sources and References
Domain 10: Physical and Environmental Security
Traditional Questions, Answers, and Explanations
Scenario-Based Questions, Answers, and Explanations
Sources and References
, Domain 1
Access Control
1. For intrusion detection and prevention system capabilities,
stateful protocol analysis uses which of the following?
1. Blacklists
2. Whitelists
3. Threshold
4. Program code viewing
a. 1 and 2
b. 1, 2, and 3
c. 3 only
d. 1, 2, 3, and 4
1. d. Stateful protocol analysis (also known as deep packet inspection) is
the process of comparing predetermined profiles of generally accepted
definitions of benign protocol activity for each protocol state against
observed events to identify deviations. Stateful protocol analysis uses
blacklists, whitelists, thresholds, and program code viewing to provide
various security capabilities.
A blacklist is a list of discrete entities, such as hosts or applications that
have been previously determined to be associated with malicious
activity. A whitelist is a list of discrete entities, such as hosts or
applications known to be benign. Thresholds set the limits between
normal and abnormal behavior of the intrusion detection and prevention
systems (IDPS). Program code viewing and editing features are
established to see the detection-related programming code in the IDPS.
2. Electronic authentication begins with which of the following?
a. Token
b. Credential
c. Subscriber
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller japplications987. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.