Front | Back |
Most key fob identification systems use which of the following types of authentication mechanisms?
|
Token
|
Which access control method gives the owner control over providing permissions?
|
Discretionary Access Control (DAC)
|
Choose the terminology or concept which best describes a (Mandatory Access Control) MAC model.
|
Lattice
|
Which of the following access control models uses roles to determine access permissions?
|
RBAC
|
Which of the following access decisions are based on a Mandatory Access control (MAC) environment?
|
Sensitivity labels
|
Which of the following types of authentication BEST describes providing a username, password and undergoing a thumb print scan to access a workstation?
|
Multifactor
|
The ability to logon to multiple systems with the same credentials is typically known as:
|
Single sign-on
|
Which security measure should be used while implementing access control?
|
Password complexity requirements
|
Which of the following is correct about an instance where a biometric system identifies unauthorized users and allows them access?
|
False acceptance
|
Which of the following authentication methods increases the security o the authentication process because it must be in your physical possession?
|
Smart Cards
|
Which password management system best provides for a system with a large number of users?
|
Self service password reset management systems
|
Who is responsible for establishing access permissions to network resources in the Discretionary Access Control (DAC) access control model?
|
The owner of the resource
|
The DAC (Discretionary Access Control) model has an inherent flaw. Choose the option that describes this flaw.
|
The DAC (Discretionary Access Control) model uses only the identity of the user or specific process to control access to a resource. This creates a security loophole for Trojan horse attacks.
|
Which of the following access control models uses subject and object labels?
|
Mandatory Access Control (MAC)
|
Which of the following will restrict access to files according to the identity of the user or group?
|
DAC
|