NAME

Question types


Start with


Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. three ways to protect organization network
  2. kerberos
  3. access control list
  4. digital certificates
  5. authentication
  1. a process used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password
  2. b network authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access
  3. c 1. do nothing- use out-of-the-box software tools 2. host security 3. network security
  4. d confirms that a message did indeed come from where it says it comes from
  5. e list of users or user groups with access authority to a secured object or service

5 Multiple choice questions

  1. protect each computer and device individually
  2. an access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have
  3. Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs
  4. provides authentication across a point-to-point link using point to point protocol (PPP), also known as a three-way handshake
  5. process where each side of an electronic communication verifies the authenticity of the other

5 True/False questions

  1. tokenhardware device used in challenge/response authentication process

          

  2. integrity levelsif the mechanism is overly complex, identifying the root of the problem may be overwhelming if not impossible. also eliminate nonessential services and protocols

          

  3. ring policyallows any subject to read any object without regard to the object's level of integrity and without lowering the subject's level of integrity (p35)

          

  4. network securitycontrol access to internal computers from external entities

          

  5. security through obscuritythe approach of protecting something by hiding it

          

Create Set