SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 305 Weeks Ago, 1 Day Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 11 Oct 2017 My Price 10.00

Which one of the following is an example of a logical access control?

Quiz 5

QUESTION 1

1.     Which one of the following is an example of a logical access control?

Key for a lock

Password

Access card

Fence

0.5 points  

QUESTION 2

1.     During which phase of the access control process does the system answer the question,"What can the requestor access?"

Identification

Authentication

Authorization

Accountability

0.5 points  

QUESTION 3

1.     Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of access control is Ed concerned about?

Identification

Authentication

Authorization

Accountability

0.5 points  

QUESTION 4

1.     The ___________ is the central part of a computing environment's hardware, software, and firmware that enforces access control.

security kernel

CPU

memory

co-processor

0.5 points  

QUESTION 5

1.     Which type of authentication includes smart cards?

Knowledge

Ownership

Location

Action

0.5 points  

QUESTION 6

1.     Which one of the following is an example of two-factor authentication?

Smart card and personal identification number (PIN)

Personal identification number (PIN) and password

Password and security questions

Token and smart card

0.5 points  

QUESTION 7

1.     Which type of password attack attempts all possible combinations of a password in an attempt to guess the correct value?

Dictionary attack

Rainbow table attack

Social engineering attack

Brute-force attack

0.5 points  

QUESTION 8

1.     Which one of the following is NOT a commonly accepted best practice for password security?

Use at least six alphanumeric characters.

Do not include usernames in passwords.

Include a special character in passwords.

Include a mixture of uppercase characters, lowercase characters, and numbers in passwords.

0.5 points  

QUESTION 9

1.     Which characteristic of a biometric system measures the system's accuracy using a balance of different error types?

False acceptance rate (FAR)

False rejection rate (FRR)

Crossover error rate (CER)

Reaction time

0.5 points  

QUESTION 10

1.     Alan is evaluating different biometric systems and is concerned that users might not want to subject themselves to retinal scans due to privacy concerns. Which characteristic of a biometric system is he considering?

Accuracy

Reaction time

Dynamism

Acceptability

0.5 points  

QUESTION 11

1.     Which one of the following is NOT an advantage of biometric systems?

Biometrics require physical presence.

Biometrics are hard to fake.

Users do not need to remember anything.

Physical characteristics may change.

0.5 points  

QUESTION 12

1.     What is a single sign-on (SSO) approach that relies upon the use of key distribution centers (KDCs) and ticket-granting servers (TGSs)?

Secure European System for Applications in a Multi-Vendor Environment (SESAME)

Lightweight Directory Access Protocol (LDAP)

Security Assertion Markup Language (SAML)

Kerberos

0.5 points  

QUESTION 13

1.     Which of the following is an example of a hardware security control?

NTFS permission

MAC filtering

ID badge

Security policy

0.5 points  

QUESTION 14

1.     Gary would like to choose an access control model in which the owner of a resource decides who may modify permissions on that resource. Which model fits that scenario?

Discretionary access control (DAC)

Mandatory access control (MAC)

Rule-based access control

Role-based access control (RBAC)

0.5 points  

QUESTION 15

1.     Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different officers to enter their access codes before allowing the system to engage. Which principle of security is this following?

Least privilege

Security through obscurity

Need to know

Separation of duties

0.5 points  

QUESTION 16

1.     Which security model does NOT protect the integrity of information?

Bell-LaPadula

Clark-Wilson

Biba

Brewer and Nash

0.5 points  

QUESTION 17

1.     Which one of the following principles is NOT a component of the Biba integrity model?

Subjects cannot read objects that have a lower level of integrity than the subject.

Subjects cannot change objects that have a lower integrity level.

Subjects at a given integrity level can call up only subjects at the same integrity

level or lower.

A subject may not ask for service from subjects that have a higher integrity level.

0.5 points  

QUESTION 18

1.     Which of the following does NOT offer authentication, authorization, and accounting (AAA) services?

Remote Authentication Dial-In User Service (RADIUS)

Terminal Access Controller Access Control System Plus (TACACS+)

Redundant Array of Independent Disks (RAID)

DIAMETER

0.5 points  

QUESTION 19

1.     What is an XML-based open standard for exchanging authentication and authorization information and is commonly used for web applications?

Security Assertion Markup Language (SAML)

Secure European System for Applications in a Multi-Vendor Environment (SESAME)

User Datagram Protocol (UDP)

Password Authentication Protocol (PAP)

0.5 points  

QUESTION 20

1.     Which of the following is NOT a benefit of cloud computing to organizations?

On-demand provisioning

Improved disaster recovery

No need to maintain a data center

Lower dependence on outside vendors

Answers

(5)
Status NEW Posted 11 Oct 2017 11:10 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)