Review Questions 325
- In the field of IT security, the concept of defense in depth is layering more than one control
on another. Why is this?
A. To provide better protection
B. To build dependency among layers
C. To increase logging ability
D. To satisfy auditors - Which of the following is used to set permissions on content in a website?
A. HIDS
B. ACE
C. ACL
D. ALS
- What could be used to monitor application errors and violations on a web server or
application?
A. HIDS
B. HIPS
C. NIDS
D. Logs - Which of the following is a type of biometric system frequently found on laptops but that
can be used on entryways as well?
A. Retina
B. Fingerprint
C. Iris
D. Voice recognition - Which of the following are required components of an alarm system?
A. A visual alerting method
B. An audio alerting method
C. Automatic dialup
D. Both A and B
- What is used to store session information?
A. Cookies
B. Snoops
C. Directories
D. Files