Which of the following issues is NOT addressed by Kerberos?
A.
Availability
B.
Confidentiality
C.
Integrity
D.
Authentication - ANS-Answer: A
Explanation:
Kerberos is a trusted, third party authentication protocol that was developed under
Project Athena
at MIT. In Greek mythology, Kerberos is a three-headed dog that guards the entrance to
the
Underworld. Using symmetric key cryptography, Kerberos authenticates clients to other
entities on
a network of which a client requires services.
Kerberos addresses the confidentiality and integrity of information. It does not address
availability.
Which of the following statements is not listed within the 4 canons of the (ISC)2 Code of
Ethics?
A.
All information systems security professionals who are certified by (ISC)2 shall observe
all
contracts and agreements, express or implied.
B.
All information systems security professionals who are certified by (ISC)2 shall render
only those
services for which they are fully competent and qualified.
C.
All information systems security professionals who are certified by (ISC)2 shall promote
and
preserve public trust and confidence in information and systems.
D.
, All information systems security professionals who are certified by (ISC)2 shall think
about the
social consequences of the program they write. - ANS-Answer: D
Explanation:
The social consequences of the programs that are written are not included in the ISC
Code of
Ethics Canon.
Regarding codes of ethics covered within the ISC2 CBK, within which of them is the
phrase
"Discourage unsafe practice" found?
A.
Computer Ethics Institute commandments
B.
(ISC)2 Code of Ethics
C.
Internet Activities Board's Ethics and the Internet (RFC1087)
D.
CIAC Guidelines - ANS-Answer: B
Explanation:
The (ISC)2 Code of Ethics include the phrase Discourage unsafe practices, and
preserve and
strengthen the integrity of public infrastructures.
Which of the following is NOT a factor related to Access Control?
A.
integrity
B.
authenticity
C.
confidentiality
D.
availability - ANS-Answer: B
Explanation:
Authenticity is not a factor related to Access Control.
Access controls are security features that control how users and systems communicate
and
interact with other systems and resources.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EXAMQA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.