Question types

Start with

Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. authentication
  2. access control
  3. integrity levels
  4. network security
  5. least privilege
  1. a control access to internal computers from external entities
  2. b process used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password
  3. c Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs
  4. d indicates the level of "trust" that can be placed in information at the different levels, and limit modification as opposed to the flow of information (p35)
  5. e regulates what a user can do on a system

5 Multiple choice questions

  1. confirms that a message did indeed come from where it says it comes from
  2. process where each side of an electronic communication verifies the authenticity of the other
  3. the use of more than one authentication mechanism at a time
  4. backups, incident response teams, computer forensics
  5. an access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have

5 True/False questions

  1. operational model of computer securityprotection = prevention + (detection + response)


  2. diversity of defensemaking different layers of security dissimilar so that even if attackers know how to get through a system made up of one layer, they may not know how to get through a different type of layer. also use different vendor products


  3. access control matrixwhen implementing authorization, the table specifying which portions of the system users are permitted to access and what actions


  4. low-water-mark-policyprevents subjects to writing to objects of a higher integrity level, and reduces the integrity level of a subject if it reads and object of lower integrity level (p35)


  5. layered securityredundancy of different protection layers ensures there is no single point of failure pertaining to security