NAME: ________________________

Question Types


Start With


Question Limit

of 31 available terms

Advertisement Upgrade to remove ads

5 Written Questions

5 Matching Questions

  1. ring policy
  2. simple security rule
  3. multifactor
  4. token
  5. diversity of defense
  1. a hardware device used in challenge/response authentication process
  2. b Bell-LaPadula security principle that states no subject can read information from an object with a security classification higher than the subject itself (p34)
  3. c allows any subject to read any object without regard to the object's level of integrity and without lowering the subject's level of integrity (p35)
  4. d the use of more than one authentication mechanism at a time
  5. e making different layers of security dissimilar so that even if attackers know how to get through a system made up of one layer, they may not know how to get through a different type of layer. also use different vendor products

5 Multiple Choice Questions

  1. backups, incident response teams, computer forensics
  2. Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs
  3. audit logs, intrusion detection systems, honeypots
  4. access controls, firewalls, encryption
  5. indicates the level of "trust" that can be placed in information at the different levels, and limit modification as opposed to the flow of information (p35)

5 True/False Questions

  1. access controlregulates what a user can do on a system

          

  2. *-propertynetwork authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access

          

  3. three ways to protect organization networkproviding something you know, something you have , something about you to prove your identity

          

  4. mandatory access controlan access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have

          

  5. authenticationprocess where each side of an electronic communication verifies the authenticity of the other

          

Create Set