NAME

Question types


Start with


Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. challenge handshake authentication protocol
  2. integrity levels
  3. digital certificates
  4. role-based access control
  5. layered security
  1. a redundancy of different protection layers ensures there is no single point of failure pertaining to security
  2. b confirms that a message did indeed come from where it says it comes from
  3. c indicates the level of "trust" that can be placed in information at the different levels, and limit modification as opposed to the flow of information (p35)
  4. d provides authentication across a point-to-point link using point to point protocol (PPP), also known as a three-way handshake
  5. e user is assigned a set of roles they can perform and roles are assigned access permission necessary to perform tasks associated with the role

5 Multiple choice questions

  1. regulates what a user can do on a system
  2. providing something you know, something you have , something about you to prove your identity
  3. protection = prevention + (detection + response)
  4. when implementing authorization, the table specifying which portions of the system users are permitted to access and what actions
  5. a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity. OS decides if access is granted

5 True/False questions

  1. host securitycontrol access to internal computers from external entities

          

  2. authenticationprocess used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password

          

  3. response technologiesaccess controls, firewalls, encryption

          

  4. multifactorthe use of more than one authentication mechanism at a time

          

  5. keep it simplenetwork authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access

          

Create Set