Chapter 12: Practice Test 4 445
Chapter 12: Practice Test 4
- C. Detective access controls operate after the fact and are intended to detect or discover
unwanted access or activity. Preventive access controls are designed to prevent the activity
from occurring, whereas corrective controls return an environment to its original status
after an issue occurs. Directive access controls limit or direct the actions of subjects to
ensure compliance with policies. - C. A honeypot is a decoy computer system used to bait intruders into attacking.
A honeynet is a network of multiple honeypots that creates a more sophisticated
environment for intruders to explore. A pseudoflaw is a false vulnerability in a system
that may attract an attacker. A darknet is a segment of unused network address space that
should have no network activity and, therefore, may be easily used to monitor for illicit
activity. - C. The CER is the point where FAR and FRR cross over, and it is a standard assessment
used to compare the accuracy of biometric devices. - A. At point B, the false acceptance rate (FAR) is quite high, whereas the false rejection
rate (FRR) is relatively low. This may be acceptable in some circumstances, but in
organizations where a false acceptance can cause a major problem, it is likely that they
should instead choose a point to the right of point A. - B. CER is a standard used to assess biometric devices. If the CER for this device does not
fit the needs of the organization, Ben should assess other biometric systems to find one
with a lower CER. Sensitivity is already accounted for in CER charts, and moving the
CER isn’t something Ben can do. FRR is not a setting in software, so Ben can’t use that as
an option either. - B. Personally identifiable information (PII) can be used to distinguish a person’s identity.
Personal health information (PHI) includes data like medical history, lab results, insurance
information, and other details about a patient. Personal Protected Data is a made-up
term, and PID is an acronym for process ID, the number associated with a running
program or process. - D. The figure shows the waterfall model, developed by Winston Royce. The key
characteristic of this model is a series of sequential steps that include a feedback loop that
allows the process to return one step prior to the current step when necessary. - B. Encapsulation creates both the benefits and potential issues with multilayer protocols.
Bridging can use various protocols but does not rely on encapsulation. Hashing
and storage protocols typically do not rely on encapsulation as a core part of their
functionality. - B. The five COBIT principles are meeting stakeholder needs, covering the enterprise
end-to-end, applying a single integrated framework, enabling a holistic approach, and
separating governance from management.