Exam 4: Access Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A __________ is a named job function within the organization that controls this computer system.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

B

_________ is the granting of a right or permission to a system entity to access a system resource.

Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
Verified

A

__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

D

A constraint is a defined relationship among roles or a condition related to roles.

(True/False)
4.8/5
(42)

T F 4.External devices such as firewalls cannot provide access control services.

(True/False)
4.8/5
(26)

Access control is the central element of computer security.

(True/False)
4.8/5
(36)

The __________ user ID is exempt from the usual file access control constraints and has system wide access.

(Essay)
4.7/5
(30)

__________ controls access based on comparing security labels with security clearances.

(Multiple Choice)
4.7/5
(29)

Any program that is owned by,and SetUID to,the "superuser" potentially grants unrestricted access to the system to any user executing that program.

(True/False)
4.8/5
(35)

The authentication function determines who is trusted for a given purpose.

(True/False)
4.8/5
(40)

Subject attributes,object attributes and environment attributes are the three types of attributes in the __________ model.

(Multiple Choice)
4.7/5
(33)

A __________ is an object or data structure that authoritatively binds an identity to a token possessed and controlled by a subscriber.

(Essay)
4.8/5
(34)

An auditing function monitors and keeps a record of user accesses to system resources.

(True/False)
4.8/5
(38)

X.800 defines __________ as the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.

(Essay)
4.8/5
(42)

The final permission bit is the _________ bit.

(Multiple Choice)
4.8/5
(39)

__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.

(Multiple Choice)
4.7/5
(41)

A(n)__________ is a resource to which access is controlled.

(Multiple Choice)
4.8/5
(32)

A user program executes in a kernel mode in which certain areas of memory are protected from the user's use and certain instructions may not be executed.

(True/False)
4.9/5
(40)

Security labels indicate which system entities are eligible to access certain resources.

(True/False)
4.8/5
(40)

An independent review and examination of system records and activities in order to test for adequacy of system controls,to ensure compliance with established policy and operational procedures,to detect breaches in security,and to recommend any indicated changes in control,policy and procedures is a(n)__________ .

(Essay)
4.8/5
(32)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)