Quiz 12

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Which one or more access control categories are sufficient to maintain the CIA triad?

Select one:
a. Preventative
b. Detective
c. Compensating
d. Corrective
Which one of the following access control types covers personnel security, monitoring, user and password
management, and permissions management?
Select one:
a. Technical
b. Physical
c. Corrective
d. Administrative
Another name for the information security triad is:
Select one:
a. The ISS triad.
b. The IST triad.
c. The FBI triad.
d. The CIA triad.
Which one of these represents the property of keeping an organization information accurate, without error,
and without unauthorized modification?
Select one:
a. Accountability
b. Availability
c. Integrity
d. Confidentiality
Risk, as it applies to information technology, is not associated with which one or more of the following
items:
Select one:
a. Processes
b. Practices
c. Principles
d. People
Previous page

Which one of the following non-discretionary access control techniques limits a subject's access to objects
by examining object data so that the subject's access rights can be determined?
Select one:
a. Rule-based
b. Role-based
c. Content dependent
d. Time-based
Which one of the following authentication methods is necessary to safeguard systems and facilities in
high-security environments?
Select one:
a. A token
b. Biometrics
c. Strong/two-factor authentication
d. A PIN
Which one of the following access control administration methods involves distributing the process to
localized parts of the enterprise?
Select one:
a. RADIUS
b. Decentralized
c. Centralized
d. Hybrid
Which one of the following access control services determines the capabilities of a subject when accessing
the object?
Select one:
a. Accountability
b. Audit
c. I&A
d. Authorization
What methods are not used to authenticate identity?
Select one:
a. Something you have
b. Something you do
c. Something you are
d. Something you know

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy