NAME

Question types


Start with


Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. access control matrix
  2. discretionary access control
  3. least privilege
  4. authentication methods
  5. token
  1. a Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs
  2. b providing something you know, something you have , something about you to prove your identity
  3. c hardware device used in challenge/response authentication process
  4. d when implementing authorization, the table specifying which portions of the system users are permitted to access and what actions
  5. e an access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have

5 Multiple choice questions

  1. network authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access
  2. regulates what a user can do on a system
  3. confirms that a message did indeed come from where it says it comes from
  4. prevents subjects to writing to objects of a higher integrity level, and reduces the integrity level of a subject if it reads and object of lower integrity level (p35)
  5. redundancy of different protection layers ensures there is no single point of failure pertaining to security

5 True/False questions

  1. response technologiesbackups, incident response teams, computer forensics

          

  2. mandatory access controla means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity. OS decides if access is granted

          

  3. access control listregulates what a user can do on a system

          

  4. ring policyallows any subject to read any object without regard to the object's level of integrity and without lowering the subject's level of integrity (p35)

          

  5. detection technologiesaccess controls, firewalls, encryption

          

Create Set