Exam 2: General Security Concepts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The policies of the Bell-LaPadula model are

(Multiple Choice)
4.9/5
(37)

Jane is in the finance department.Although she should not be able to modify files or folders from the marketing department,she can,and does.This a problem of ___________.

(Multiple Choice)
4.9/5
(40)

Which of the following is a security model that addresses integrity?

(Multiple Choice)
4.8/5
(25)

The database administrator falls ill and is not able to come to work for three weeks.No one else in the company knows how to administer the database server.This is a result of not following which principle?

(Multiple Choice)
4.9/5
(34)

_______________ security places the emphasis on controlling access to internal computers from external entities.

(Short Answer)
4.8/5
(36)

The policies of the Biba model are

(Multiple Choice)
4.9/5
(43)

Nonrepudiation means that the person who sends an e-mail will be unable to deny sending the e-mail.

(True/False)
4.8/5
(21)

Rumors spread around the office that Mrs.Smith was stealing office supplies as well as talking badly about the senior management.This rumor eventually reached her boss,who then fired her.This is likely a violation of which policy?

(Multiple Choice)
4.7/5
(26)

_______________ ensures that the data,or the system itself,is available for use when the authorized user wants it.

(Short Answer)
4.9/5
(30)

John,who is in the development group,has admin passwords to both the development group files and the production group files.This might be a violation of which policy?

(Multiple Choice)
4.9/5
(34)

To ensure that only those individuals who have authority to view a piece of information may do so is called _______________.

(Short Answer)
4.9/5
(41)

The term which refers to the attempt to gain unauthorized access to systems and computers used by a telephone company to operate its telephone network is a _______.

(Multiple Choice)
4.8/5
(31)

Reducing the number of services to the least number necessary for it to properly perform its functions is an example of which principle?

(Multiple Choice)
4.9/5
(36)

The formula for the operational model of computer security is Prevention = Protection + (Detection + Response)

(True/False)
4.8/5
(34)

Joe sends a scathing e-mail to his boss regarding increased work hours.Joe tries to deny sending the e-mail,but is unable to due to the use of digital signatures.This is an example of ________.

(Multiple Choice)
4.8/5
(37)

Bob inadvertently disconnects the cable from the company file server.This creates a problem of ________.

(Multiple Choice)
4.9/5
(31)

Making the effort to compromise a system more costly than the value of accomplishing it is the goal of security.

(True/False)
4.8/5
(28)

Gathering seemingly unimportant information and then combining it to discover potentially sensitive information is known as _______________.

(Short Answer)
4.8/5
(26)

Which of the following is a security model that uses transactions as the basis for its rules?

(Multiple Choice)
4.9/5
(35)

Audit logs,intrusion detection systems,and honeypots are technologies used for detection.

(True/False)
4.8/5
(42)
Showing 21 - 40 of 65
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)