NAME

Question types


Start with


Question limit

of 31 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. detection technologies
  2. least privilege
  3. prevention technologies
  4. digital certificates
  5. authentication
  1. a audit logs, intrusion detection systems, honeypots
  2. b confirms that a message did indeed come from where it says it comes from
  3. c process used to verify the computer system or network that the individual is who they claim to be, usually through user ID and password
  4. d access controls, firewalls, encryption
  5. e Users only have the minimum set of rights, permissions, and privileges that they need to accomplish their jobs

5 Multiple choice questions

  1. 1. do nothing- use out-of-the-box software tools 2. host security 3. network security
  2. network authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access
  3. the use of more than one authentication mechanism at a time
  4. allows any subject to read any object without regard to the object's level of integrity and without lowering the subject's level of integrity (p35)
  5. an access policy determined by the owner of a file (or other resource). The owner decides who's allowed access to the file and what privileges they have

5 True/False questions

  1. layered securityredundancy of different protection layers ensures there is no single point of failure pertaining to security

          

  2. network securitycontrol access to internal computers from external entities

          

  3. tokennetwork authentication protocol designed for client/server environment that issues tickets by an authentication server that is trusted by the client and the server the client wishes to access

          

  4. security through obscuritythe approach of protecting something by hiding it

          

  5. access control matrixlist of users or user groups with access authority to a secured object or service

          

Create Set