NAME

Question types


Start with


Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. discretionary access control
  2. least privilege
  3. layered security
  4. detection technologies
  5. security through obscurity
  1. a redundancy of different protection layers ensures there is no single point of failure pertaining to security
  2. b Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs
  3. c the approach of protecting something by hiding it
  4. d an access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have
  5. e audit logs, intrusion detection systems, honeypots

5 Multiple choice questions

  1. hardware device used in challenge/response authentication process
  2. when implementing authorization, the table specifying which portions of the system users are permitted to access and what actions
  3. access controls, firewalls, encryption
  4. list of users or user groups with access authority to a secured object or service
  5. 1. do nothing- use out-of-the-box software tools 2. host security 3. network security

5 True/False questions

  1. multifactorprocess used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password

          

  2. simple security ruleprotect each computer and device individually

          

  3. response technologiesbackups, incident response teams, computer forensics

          

  4. operational model of computer securityprotection = prevention + (detection + response)

          

  5. mutual authenticationprocess used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password

          

Create Set