NAME

Question Types


Start With


Question Limit

of 31 available terms

Advertisement Upgrade to remove ads

5 Written Questions

5 Matching Questions

  1. security through obscurity
  2. authentication
  3. host security
  4. ring policy
  5. access control matrix
  1. a allows any subject to read any object without regard to the object's level of integrity and without lowering the subject's level of integrity (p35)
  2. b process used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password
  3. c when implementing authorization, the table specifying which portions of the system users are permitted to access and what actions
  4. d the approach of protecting something by hiding it
  5. e protect each computer and device individually

5 Multiple Choice Questions

  1. provides authentication across a point-to-point link using point to point protocol (PPP), also known as a three-way handshake
  2. if the mechanism is overly complex, identifying the root of the problem may be overwhelming if not impossible. also eliminate nonessential services and protocols
  3. the use of more than one authentication mechanism at a time
  4. network authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access
  5. a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity. OS decides if access is granted

5 True/False Questions

  1. discretionary access controla means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity. OS decides if access is granted

          

  2. simple security ruleBell-LaPadula security principle that states no subject can read information from an object with a security classification higher than the subject itself (p34)

          

  3. tokenhardware device used in challenge/response authentication process

          

  4. mutual authenticationprocess used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password

          

  5. digital certificatesUsers only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs

          

Create Set