Chapter 12 ■ Practice Test 4 297
A. Ring 0
B. Ring 1
C. Ring 2
D. Ring 3
- What level of RAID is also known as disk striping?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
- Jacob executes an attack against a system using a valid but low-privilege user account
by accessing a file pointer that the account has access to. After the access check, but
before the file is opened, he quickly switches the file pointer to point to a file that the user
account does not have access to. What type of attack is this?
A. TOCTOU
B. Permissions creep
C. Impersonation
D. Link swap - What is the minimum number of disks required to implement RAID level 0?
A. 1
B. 2
C. 3
D. 5
- Fred’s company wants to ensure the integrity of email messages sent via their central
email servers. If the confidentiality of the messages is not critical, what solution should
Fred suggest?
A. Digitally sign and encrypt all messages to ensure integrity.
B. Digitally sign but don’t encrypt all messages.
C. Use TLS to protect messages, ensuring their integrity.
D. Use a hashing algorithm to provide a hash in each message to prove that it hasn’t
changed. - The leadership at Susan’s company has asked her to implement an access control system
that can support rule declarations like “Only allow access to salespeople from managed
devices on the wireless network between 8 a.m. and 6 p.m.” What type of access control
system would be Susan’s best choice?
A. ABAC
B. RBAC
C. DAC
D. M AC