Quiz 12
Quiz 12
Quiz 12
Select one:
a. Preventative
b. Detective
c. Compensating
d. Corrective
Which one of the following access control types covers personnel security, monitoring, user and password
management, and permissions management?
Select one:
a. Technical
b. Physical
c. Corrective
d. Administrative
Another name for the information security triad is:
Select one:
a. The ISS triad.
b. The IST triad.
c. The FBI triad.
d. The CIA triad.
Which one of these represents the property of keeping an organization information accurate, without error,
and without unauthorized modification?
Select one:
a. Accountability
b. Availability
c. Integrity
d. Confidentiality
Risk, as it applies to information technology, is not associated with which one or more of the following
items:
Select one:
a. Processes
b. Practices
c. Principles
d. People
Previous page
Which one of the following non-discretionary access control techniques limits a subject's access to objects
by examining object data so that the subject's access rights can be determined?
Select one:
a. Rule-based
b. Role-based
c. Content dependent
d. Time-based
Which one of the following authentication methods is necessary to safeguard systems and facilities in
high-security environments?
Select one:
a. A token
b. Biometrics
c. Strong/two-factor authentication
d. A PIN
Which one of the following access control administration methods involves distributing the process to
localized parts of the enterprise?
Select one:
a. RADIUS
b. Decentralized
c. Centralized
d. Hybrid
Which one of the following access control services determines the capabilities of a subject when accessing
the object?
Select one:
a. Accountability
b. Audit
c. I&A
d. Authorization
What methods are not used to authenticate identity?
Select one:
a. Something you have
b. Something you do
c. Something you are
d. Something you know