Question types

Start with

Question limit

of 31 available terms

Print test

5 Written questions

5 Matching questions

  1. three ways to protect organization network
  2. challenge handshake authentication protocol
  3. integrity levels
  4. least privilege
  5. mandatory access control
  1. a a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity. OS decides if access is granted
  2. b provides authentication across a point-to-point link using point to point protocol (PPP), also known as a three-way handshake
  3. c indicates the level of "trust" that can be placed in information at the different levels, and limit modification as opposed to the flow of information (p35)
  4. d 1. do nothing- use out-of-the-box software tools 2. host security 3. network security
  5. e Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs

5 Multiple choice questions

  1. regulates what a user can do on a system
  2. list of users or user groups with access authority to a secured object or service
  3. hardware device used in challenge/response authentication process
  4. the use of more than one authentication mechanism at a time
  5. access controls, firewalls, encryption

5 True/False questions

  1. low-water-mark-policyprevents subjects to writing to objects of a higher integrity level, and reduces the integrity level of a subject if it reads and object of lower integrity level (p35)


  2. role-based access controluser is assigned a set of roles they can perform and roles are assigned access permission necessary to perform tasks associated with the role


  3. layered securityprotect each computer and device individually


  4. host securityprotect each computer and device individually


  5. ring policyallows any subject to read any object without regard to the object's level of integrity and without lowering the subject's level of integrity (p35)