NAME

Question types


Start with


Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. host security
  2. access control matrix
  3. integrity levels
  4. security through obscurity
  5. kerberos
  1. a when implementing authorization, the table specifying which portions of the system users are permitted to access and what actions
  2. b network authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access
  3. c indicates the level of "trust" that can be placed in information at the different levels, and limit modification as opposed to the flow of information (p35)
  4. d the approach of protecting something by hiding it
  5. e protect each computer and device individually

5 Multiple choice questions

  1. 1. do nothing- use out-of-the-box software tools 2. host security 3. network security
  2. redundancy of different protection layers ensures there is no single point of failure pertaining to security
  3. Bell-LaPadula security principle that states a subject can write to an object if its security classification is less than or equal to the object's security classification (p34)
  4. a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity. OS decides if access is granted
  5. making different layers of security dissimilar so that even if attackers know how to get through a system made up of one layer, they may not know how to get through a different type of layer. also use different vendor products

5 True/False questions

  1. role-based access controla means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity. OS decides if access is granted

          

  2. multifactorprocess used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password

          

  3. detection technologiesaccess controls, firewalls, encryption

          

  4. access control listregulates what a user can do on a system

          

  5. least privilegeUsers only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs

          

Create Set