Question Types

Start With

Question Limit

of 31 available terms

Advertisement Upgrade to remove ads

5 Written Questions

5 Matching Questions

  1. layered security
  2. three ways to protect organization network
  3. challenge handshake authentication protocol
  4. access control list
  5. response technologies
  1. a backups, incident response teams, computer forensics
  2. b 1. do nothing- use out-of-the-box software tools 2. host security 3. network security
  3. c provides authentication across a point-to-point link using point to point protocol (PPP), also known as a three-way handshake
  4. d redundancy of different protection layers ensures there is no single point of failure pertaining to security
  5. e list of users or user groups with access authority to a secured object or service

5 Multiple Choice Questions

  1. user is assigned a set of roles they can perform and roles are assigned access permission necessary to perform tasks associated with the role
  2. protect each computer and device individually
  3. the approach of protecting something by hiding it
  4. control access to internal computers from external entities
  5. indicates the level of "trust" that can be placed in information at the different levels, and limit modification as opposed to the flow of information (p35)

5 True/False Questions

  1. discretionary access controla means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity. OS decides if access is granted


  2. digital certificatesconfirms that a message did indeed come from where it says it comes from


  3. operational model of computer securityprotection = prevention + (detection + response)


  4. tokennetwork authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access


  5. prevention technologiesaudit logs, intrusion detection systems, honeypots


Create Set