NAME

Question types


Start with


Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. detection technologies
  2. *-property
  3. layered security
  4. least privilege
  5. access control list
  1. a Bell-LaPadula security principle that states a subject can write to an object if its security classification is less than or equal to the object's security classification (p34)
  2. b Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs
  3. c redundancy of different protection layers ensures there is no single point of failure pertaining to security
  4. d list of users or user groups with access authority to a secured object or service
  5. e audit logs, intrusion detection systems, honeypots

5 Multiple choice questions

  1. when implementing authorization, the table specifying which portions of the system users are permitted to access and what actions
  2. user is assigned a set of roles they can perform and roles are assigned access permission necessary to perform tasks associated with the role
  3. provides authentication across a point-to-point link using point to point protocol (PPP), also known as a three-way handshake
  4. the use of more than one authentication mechanism at a time
  5. allows any subject to read any object without regard to the object's level of integrity and without lowering the subject's level of integrity (p35)

5 True/False questions

  1. host securitycontrol access to internal computers from external entities

          

  2. authentication methodsprocess used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password

          

  3. low-water-mark-policyallows any subject to read any object without regard to the object's level of integrity and without lowering the subject's level of integrity (p35)

          

  4. authenticationprocess where each side of an electronic communication verifies the authenticity of the other

          

  5. access controlregulates what a user can do on a system