Which of the following security models dictates that subjects can only access objects through applications?
Correct Answer:
C
Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
Correct Answer:
A
Which of the following sites are similar to the hot site facilities, with the exception that they are completely dedicated, self-developed recovery facilities?
Correct Answer:
D
John is a black hat hacker. FBI arrested him while performing some email scams. Under which of the following US laws will john be charged?
Correct Answer:
B
Which of the following relies on a physical characteristic of the user to verify his identity?
Correct Answer:
C