NAME

Question types


Start with


Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. access control matrix
  2. three ways to protect organization network
  3. challenge handshake authentication protocol
  4. access control list
  5. *-property
  1. a when implementing authorization, the table specifying which portions of the system users are permitted to access and what actions
  2. b provides authentication across a point-to-point link using point to point protocol (PPP), also known as a three-way handshake
  3. c Bell-LaPadula security principle that states a subject can write to an object if its security classification is less than or equal to the object's security classification (p34)
  4. d list of users or user groups with access authority to a secured object or service
  5. e 1. do nothing- use out-of-the-box software tools 2. host security 3. network security

5 Multiple choice questions

  1. Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs
  2. process used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password
  3. hardware device used in challenge/response authentication process
  4. providing something you know, something you have , something about you to prove your identity
  5. indicates the level of "trust" that can be placed in information at the different levels, and limit modification as opposed to the flow of information (p35)

5 True/False questions

  1. digital certificatesconfirms that a message did indeed come from where it says it comes from

          

  2. operational model of computer securitythe approach of protecting something by hiding it

          

  3. host securitycontrol access to internal computers from external entities

          

  4. multifactorprocess used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password

          

  5. simple security ruleBell-LaPadula security principle that states no subject can read information from an object with a security classification higher than the subject itself (p34)

          

Create Set