Preview

Access Control and Data Security Assures

Satisfactory Essays
Open Document
Open Document
339 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control and Data Security Assures
1. Which property of data security assures that only authorized users can modify data?
a. Availability
b. Integrity
c. Confidentiality
d. Non-repudiation

2. Which property of data would a successful denial-of-service (DoS) attack most affect?
a. Availability
b. Integrity
c. Confidentiality
d. Non-repudiation

3. Which of the following is a stand-alone malicious software program that actively transmits itself, generally over networks, to infect other computers?
a. Virus
b. Trojan horse
c. Worm
d. Backdoor

4. Which description below best describes a physical control?
a. A device that limits access or otherwise protects a resource, such as a fence, door, lock, or fire extinguisher.
b. A control that repairs the effects of damage from an attack.
c. A device or process that limits access to a resource. Examples include user authentication, antivirus software, and firewalls.
d. A management action, written policy, procedure, guideline, regulation, law, or rule of any kind.

5. Which term means any exposure to a threat?
a. Risk
b. Vulnerability
c. Attack
d. Control

6. Which term means the collection of all possible vulnerabilities that could provide unauthorized access to computer resources?
a. Vulnerability universe
b. Risk exposure
c. Threat model
d. Attack surface

7. Which of the following terms mean the act of granting and/or denying access to resources based on the authenticated user?
a. Identification
b. Authentication
c. Validation
d. Authorization

8. Which of the following terms is an access control method based on the subject’s clearance and the object’s classification?
a. Discretionary Access Control (DAC)
b. Mandatory Access Control (MAC)
c. Role Based Access Control (RBAC)
d. Line Driver Access Control (LDAC)

9. Which type of authentication is based on a physical object that contains identity information, such as a token, card, or other device?
a. Type IV
b. Type III
c. Type II
d. Type I

10.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    8. Computers that belong to the same domain can access a common security database of user and computer account information. That type of database on Windows 2003 domain controller servers is also known as a _____ database?…

    • 1510 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Scenario 4: Content-Dependent Access Control. Since everything that the company does depends on the individual material being manufactured the above Access Control type should be apparent. Giving permissions by what is contained in each individual file is more costly but, a lot more secure. It also allows the company to monitor the data sent less as each document is given its own set of roles.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In practice, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices etc. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object will be tested against the set of authorization rules (aka policy) to determine if the operation is allowed. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    Name: ________________________ Class: ___________________ Date: __________ CS11-Online-Chapter09 Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Computer crime is sometimes referred to as ____. a. hacking c. b. cybercrime d.…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    7. Which of the following relative identifiers (RID) listed below identifies the administrator account on a Windows system?…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    70-643 Lesson 2

    • 579 Words
    • 3 Pages

    ACL - A collection of access control entries that defines the access that all users and groups have to an object…

    • 579 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Java Programming I Exam

    • 912 Words
    • 4 Pages

    A(n) ____ defines the circumstances under which a class can be accessed and the other classes that have the right to use a class.…

    • 912 Words
    • 4 Pages
    Satisfactory Essays