Exam 4: Access Control
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
An access right describes the way in which a subject may access an object.
(True/False)
4.7/5
(30)
A user program executes in a kernel mode in which certain areas of memory
are protected from the user's use and certain instructions may not be executed.
(True/False)
4.7/5
(31)
The NIST model defines two types of role hierarchies: general role hierarchies and ___________ hierarchies.
(Short Answer)
4.8/5
(34)
X.800 defines __________ as the prevention of unauthorized use of a resource,
including the prevention of use of a resource in an unauthorized manner.
(Short Answer)
4.8/5
(40)
A(n)__________ is a resource to which access is controlled.
(Multiple Choice)
4.7/5
(24)
Any program that is owned by,and SetUID to,the "superuser" potentially
grants unrestricted access to the system to any user executing that program.
(True/False)
4.8/5
(33)
The __________ user ID is exempt from the usual file access control constraints and has system wide access.
(Short Answer)
4.9/5
(34)
_________ is the granting of a right or permission to a system entity to access a system resource.
(Multiple Choice)
4.8/5
(34)
__________ controls access based on comparing security labels with security clearances.
(Multiple Choice)
4.8/5
(31)
An independent review and examination of system records and activities in order to test for adequacy of system controls,to ensure compliance with established policy and operational procedures,to detect breaches in security,and to recommend any indicated changes in control,policy and procedures is a(n)__________ .
(Short Answer)
4.9/5
(36)
The __________ functions include the following: create a user session with a default set of active roles; add an active role to a session; delete a role from a session; and check if the session subject has permission to perform a request operation on an object.
(Short Answer)
4.8/5
(32)
A constraint is a defined relationship among roles or a condition related to
roles.
(True/False)
4.8/5
(31)
__________ Separation of Duty enables the definition of a set of mutually exclusive roles,such that if a user is assigned to one role in the set,the user may not be assigned to any other role in the set.
(Short Answer)
4.9/5
(32)
A __________ access control scheme is one in which an entity may be granted access rights that permit the entity,by its own volition,to enable another entity to access some resource.
(Short Answer)
4.8/5
(41)
__________ refers to setting a maximum number with respect to roles.
(Multiple Choice)
4.7/5
(35)
T F 4.External devices such as firewalls cannot provide access control services.
(True/False)
4.8/5
(41)
Traditional RBAC systems define the access rights of individual users and
groups of users.
(True/False)
4.9/5
(36)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)