Exam 3: Authenticating Users

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. -This principle limits individuals' information access to what is required to perform their jobs.

(Multiple Choice)
4.8/5
(39)

Match each item with a statement below. -This principle increases the security of information and other assets by requiring that more than one individual be responsible for a particular information asset, process, or task.

(Multiple Choice)
4.9/5
(25)

In ____, access to a specific set of information is dependent on the information's content.

(Multiple Choice)
4.8/5
(26)

A PIN is an example of something you ____.

(Multiple Choice)
5.0/5
(31)

____ authentication is most commonly set up as a form of auditing and occurs when a system records the activities of each user and writes details about each activity to a log file.

(Multiple Choice)
4.9/5
(39)

Access controls are defined only using technology.

(True/False)
4.8/5
(40)

____ access controls help the organization avoid an incident.

(Multiple Choice)
4.8/5
(30)

With ____________________ authentication, the firewall enables the authenticated user to access the desired resources for a specific period of time.

(Short Answer)
4.8/5
(31)

In a lattice-based access control, the column of attributes associated with a particular object is referred to as a(n) ____.

(Multiple Choice)
4.7/5
(34)

Role-based access controls are a type of ____ access controls.

(Multiple Choice)
4.8/5
(36)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)