Exam 5: ID and Access
Exam 1: Assessment7 Questions
Exam 2: Assets9 Questions
Exam 3: Communication39 Questions
Exam 4: Engineering69 Questions
Exam 5: ID and Access17 Questions
Exam 6: Management51 Questions
Exam 7: Operations85 Questions
Exam 8: Software22 Questions
Select questions type
What is made up of hardware, software, and firmware components that fall within the TCB and enforces the reference monitor concept?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
B
What could a company do to prevent an employee from accessing a higher level of access by preventing them from even knowing it exists?
Free
(Multiple Choice)
4.7/5
(48)
Correct Answer:
D
What protocol combines the authentication and authorization functionality?
Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
B
What is based on the sensitivity of data and knows what actions should be allowed?
(Multiple Choice)
4.8/5
(33)
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis is the most accurate?
(Multiple Choice)
4.7/5
(42)
Olivia provided security features that control how users and systems communicate and interact with other systems and resources. What did Olivia create?
(Multiple Choice)
4.9/5
(37)
What type of access control synchronizes with the authentication service by using time or a count as the core piece of the authentication process?
(Multiple Choice)
4.9/5
(34)
What broad term encompasses the use of different products to identify, authenticate, and authorize users through automated means?
(Multiple Choice)
5.0/5
(33)
Once an organization determines it needs to have access control techniques and technologies in place, it must choose which kind. What kind uses specific rules that indicative what can and cannot happen between a subject and an object?
(Multiple Choice)
4.8/5
(35)
Jeffery is signing in to his network station and is being challenged by a random value called a nonce. Why type of device is this?
(Multiple Choice)
4.8/5
(36)
What is defined as a set of objects that a subject is able to access?
(Multiple Choice)
4.8/5
(39)
There are two processes taking place at the same time, as in data within a variable, through a shared resource, in an incorrect order. What term is being applied?
(Multiple Choice)
4.8/5
(30)
What security measure analysis is a unique personal attribute or behavior?
(Multiple Choice)
4.8/5
(35)
Access control layers consist of administrative controls, physical controls, and technical controls that work at different levels of what?
(Multiple Choice)
4.9/5
(26)
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis looks at different peaks and valleys of the hand?
(Multiple Choice)
4.7/5
(32)
What method gives control of access to the people that are closer to the resources that may better understand who should and should not have access to certain files, data, and resources?
(Multiple Choice)
4.9/5
(34)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)