Exam 3: Authenticating Users
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Match each item with a statement below.
-This principle limits individuals' information access to what is required to perform their jobs.
(Multiple Choice)
4.8/5
(39)
Match each item with a statement below.
-This principle increases the security of information and other assets by requiring that more than one individual be responsible for a particular information asset, process, or task.
(Multiple Choice)
4.9/5
(25)
In ____, access to a specific set of information is dependent on the information's content.
(Multiple Choice)
4.8/5
(26)
____ authentication is most commonly set up as a form of auditing and occurs when a system records the activities of each user and writes details about each activity to a log file.
(Multiple Choice)
4.9/5
(39)
____ access controls help the organization avoid an incident.
(Multiple Choice)
4.8/5
(30)
With ____________________ authentication, the firewall enables the authenticated user to access the desired resources for a specific period of time.
(Short Answer)
4.8/5
(31)
In a lattice-based access control, the column of attributes associated with a particular object is referred to as a(n) ____.
(Multiple Choice)
4.7/5
(34)
Role-based access controls are a type of ____ access controls.
(Multiple Choice)
4.8/5
(36)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)