NAME

Question types


Start with


Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. ring policy
  2. operational model of computer security
  3. simple security rule
  4. keep it simple
  5. multifactor
  1. a protection = prevention + (detection + response)
  2. b the use of more than one authentication mechanism at a time
  3. c allows any subject to read any object without regard to the object's level of integrity and without lowering the subject's level of integrity (p35)
  4. d Bell-LaPadula security principle that states no subject can read information from an object with a security classification higher than the subject itself (p34)
  5. e if the mechanism is overly complex, identifying the root of the problem may be overwhelming if not impossible. also eliminate nonessential services and protocols

5 Multiple choice questions

  1. provides authentication across a point-to-point link using point to point protocol (PPP), also known as a three-way handshake
  2. providing something you know, something you have , something about you to prove your identity
  3. list of users or user groups with access authority to a secured object or service
  4. indicates the level of "trust" that can be placed in information at the different levels, and limit modification as opposed to the flow of information (p35)
  5. Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs

5 True/False questions

  1. three ways to protect organization networkproviding something you know, something you have , something about you to prove your identity

          

  2. tokennetwork authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access

          

  3. detection technologiesaudit logs, intrusion detection systems, honeypots

          

  4. network securityprotect each computer and device individually

          

  5. mandatory access controlan access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have