Which of the following indicates the subjects that can use them?
A.
Access control list
B.
Audit policy
C.
Intrusion detection system
D.
Single sign-on
Explanation:
Access control list indicates what subjects can use them.
Access Control List (ACL) is the most commonly used object in Cisco IOS. It filters packets or network
traffic by controlling whether routed packets are forwarded or blocked at the router’s interfaces.
According to the criteria specified within the access lists, router determines whether the packets to
be forwarded or dropped. Access control list criteria could be the source or destination address of
the traffic or other information. The types of Cisco ACLs are Standard IP, Extended IP, IPX, Appletalk,
etc.
Answer option B is incorrect. Audit policy defines the type of security events that will be logged for
the servers of a domain or for an individual computer. It does not indicate what subjects can use
them.
Answer option C is incorrect. An Intrusion detection system (IDS) is software and/or hardware
designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer
systems, mainly through a network, such as the Internet. These attempts may take the form of
attacks, as examples, by crackers, malware and/or disgruntled employees. An IDS cannot directly
detect attacks within properly
encrypted traffic. An intrusion detection system is used to detect several types of malicious
behaviors that can compromise the security and trust of a computer system. This includes network
attacks against vulnerable services, data driven attacks on applications, host based attacks
such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses,
trojan horses, and worms).
Answer option D is incorrect. Single sign-on is a process that enables a user with a domain account
to log on to a network once, using apassword or smart card, and to gain access to multiple computers in the domain without being
prompted to log in again.
Reference: “http://en.wikipedia.org/wiki/Access_control_list”