Kerberos is vulnerable to replay in which of the following circumstances?
Replay can be accomplished on Kerberos if the compromised tickets are used within an allotted time window.
The security depends on careful implementation:enforcing limited lifetimes for authentication credentials minimizes the threat of of replayed credentials, the KDC must be physically secured, and it should be hardened, not permitting any non-kerberos activities.
Official ISC2 Guide to the CISSP, 2007 Edition, page 184
also see:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 42.
Due care is not related to:
Officers and directors of a company are expected to act carefully in fulfilling their tasks. A director shall act in good faith, with the care an ordinarily prudent person in a like position would exercise under similar circumstances and in a manner he reasonably believes is in the best interest of the enterprise. The notion of profit would tend to go against the due care principle.
Source: ANDRESS, Mandy, Exam Cram CISSP, Coriolis, 2001, Chapter 10: Law, Investigation, and Ethics (page 186).
What is the most critical characteristic of a biometric identifying system?
Accuracy is the most critical characteristic of a biometric identifying verification system.
Accuracy is measured in terms of false rejection rate (FRR, or type I errors) and false acceptance rate (FAR or type II errors).
The Crossover Error Rate (CER) is the point at which the FRR equals the FAR and has become the most important measure of biometric system accuracy.
Source: TIPTON, Harold F. & KRAUSE, Micki, Information Security Management Handbook, 4th edition (volume 1), 2000, CRC Press, Chapter 1, Biometric Identification (page 9).
Related to information security, integrity is the opposite of which of the following?
Integrity is the opposite of 'alteration.'
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 59.
In which of the following phases of system development life cycle (SDLC) is contingency planning most important?
Contingency planning requirements should be considered at every phase of SDLC, but most importantly when a new IT system is being conceived. In the initiation phase, system requirements are identified and matched to their related operational processes, allowing determination of the system's appropriate recovery priority.
Source: SWANSON, Marianne, & al., National Institute of Standards and Technology (NIST), NIST Special Publication 800-34, Contingency Planning Guide for Information Technology Systems, December 2001 (page 12).
and
The Official ISC2 Guide to the CBK, Second Edition, Application Security, page 180-185
Alisha
1 months agoBo
1 months agoEve
2 months agoParis
2 months agoVesta
2 months agoMing
3 months agoBok
3 months agoMaryann
3 months agoValentine
3 months agoKeshia
3 months agoSocorro
4 months agoMonte
4 months agoHan
4 months agoDelbert
5 months agoGerri
5 months agoLawanda
5 months agoDalene
5 months agoScarlet
5 months agoLavonda
6 months agoJunita
6 months agoCherry
6 months agoColette
6 months agoNohemi
6 months agoHubert
7 months agoDalene
7 months agoMertie
7 months agoMicah
7 months agoKayleigh
7 months agoAretha
8 months agoAlita
8 months agoEun
9 months agoShannon
10 months agoNettie
10 months ago