Exam 4: Access Control
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
A __________ is a named job function within the organization that controls this computer system.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
B
_________ is the granting of a right or permission to a system entity to access a system resource.
Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
A
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.
Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
D
A constraint is a defined relationship among roles or a condition related to
roles.
(True/False)
4.8/5
(42)
T F 4.External devices such as firewalls cannot provide access control services.
(True/False)
4.8/5
(26)
The __________ user ID is exempt from the usual file access control constraints and has system wide access.
(Essay)
4.7/5
(30)
__________ controls access based on comparing security labels with security clearances.
(Multiple Choice)
4.7/5
(29)
Any program that is owned by,and SetUID to,the "superuser" potentially
grants unrestricted access to the system to any user executing that program.
(True/False)
4.8/5
(35)
The authentication function determines who is trusted for a given purpose.
(True/False)
4.8/5
(40)
Subject attributes,object attributes and environment attributes are the three types of attributes in the __________ model.
(Multiple Choice)
4.7/5
(33)
A __________ is an object or data structure that authoritatively binds an identity to a token possessed and controlled by a subscriber.
(Essay)
4.8/5
(34)
An auditing function monitors and keeps a record of user accesses to
system resources.
(True/False)
4.8/5
(38)
X.800 defines __________ as the prevention of unauthorized use of a resource,
including the prevention of use of a resource in an unauthorized manner.
(Essay)
4.8/5
(42)
__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.
(Multiple Choice)
4.7/5
(41)
A(n)__________ is a resource to which access is controlled.
(Multiple Choice)
4.8/5
(32)
A user program executes in a kernel mode in which certain areas of memory
are protected from the user's use and certain instructions may not be executed.
(True/False)
4.9/5
(40)
Security labels indicate which system entities are eligible to access certain
resources.
(True/False)
4.8/5
(40)
An independent review and examination of system records and activities in order to test for adequacy of system controls,to ensure compliance with established policy and operational procedures,to detect breaches in security,and to recommend any indicated changes in control,policy and procedures is a(n)__________ .
(Essay)
4.8/5
(32)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)