1. Right Answer: C
Explanation: Without management support, all other efforts will be undermined. Metrics, baselines and training are all important, but they depend on management support for their success.
2. Right Answer: A
Explanation: A locally managed file server will be the least likely to conform to organizational security policies because it is generally subject to less oversight and monitoring.Centrally managed data switches, web server clusters and data warehouses are subject to close scrutiny, good change control practices and monitoring.
3. Right Answer: D
Explanation: Effective nonrepudiation requires the use of digital signatures. Reverse lookup translation involves converting Internet Protocol (IP) addresses to usernames.Delivery path tracing shows the route taken but does not confirm the identity of the sender. Out-of-band channels are useful when, for confidentiality, it is necessary to break a message into two parts that are sent by different means.
4. Right Answer: D
Explanation: Role-based access controls will grant temporary employee access based on the job function to be performed. This provides a better means of ensuring that the access is not more or less than what is required. Discretionary, mandatory and lattice-based access controls are all security models, hut they do not address the issue of temporary employees as well as role-based access controls.
5. Right Answer: C
Explanation: Configuration management provides the greatest likelihood of security weaknesses through misconfiguration and failure to update operating system (OS) code correctly and on a timely basis.