NAME

Question types


Start with


Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. ring policy
  2. role-based access control
  3. digital certificates
  4. token
  5. integrity levels
  1. a indicates the level of "trust" that can be placed in information at the different levels, and limit modification as opposed to the flow of information (p35)
  2. b allows any subject to read any object without regard to the object's level of integrity and without lowering the subject's level of integrity (p35)
  3. c hardware device used in challenge/response authentication process
  4. d confirms that a message did indeed come from where it says it comes from
  5. e user is assigned a set of roles they can perform and roles are assigned access permission necessary to perform tasks associated with the role

5 Multiple choice questions

  1. providing something you know, something you have , something about you to prove your identity
  2. the approach of protecting something by hiding it
  3. Bell-LaPadula security principle that states a subject can write to an object if its security classification is less than or equal to the object's security classification (p34)
  4. access controls, firewalls, encryption
  5. Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs

5 True/False questions

  1. simple security ruleBell-LaPadula security principle that states no subject can read information from an object with a security classification higher than the subject itself (p34)

          

  2. keep it simpleif the mechanism is overly complex, identifying the root of the problem may be overwhelming if not impossible. also eliminate nonessential services and protocols

          

  3. response technologiesbackups, incident response teams, computer forensics

          

  4. mutual authenticationprocess used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password

          

  5. operational model of computer securityredundancy of different protection layers ensures there is no single point of failure pertaining to security

          

Create Set