Question types

Start with

Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. mandatory access control
  2. response technologies
  3. mutual authentication
  4. layered security
  5. kerberos
  1. a backups, incident response teams, computer forensics
  2. b process where each side of an electronic communication verifies the authenticity of the other
  3. c network authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access
  4. d redundancy of different protection layers ensures there is no single point of failure pertaining to security
  5. e a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity. OS decides if access is granted

5 Multiple choice questions

  1. an access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have
  2. protect each computer and device individually
  3. confirms that a message did indeed come from where it says it comes from
  4. user is assigned a set of roles they can perform and roles are assigned access permission necessary to perform tasks associated with the role
  5. providing something you know, something you have , something about you to prove your identity

5 True/False questions

  1. access controlregulates what a user can do on a system


  2. security through obscuritythe approach of protecting something by hiding it


  3. access control matrixwhen implementing authorization, the table specifying which portions of the system users are permitted to access and what actions


  4. three ways to protect organization networkproviding something you know, something you have , something about you to prove your identity


  5. detection technologiesaccess controls, firewalls, encryption


Create Set