Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

unit 3 quiz 1 1. network system and database are types of subject in an access c

ID: 3544005 • Letter: U

Question

unit 3 quiz 1


1. network system and database are types of subject in an access control


a.true

b.false


2. The formalization of rules for allowing or denying rights and privileges in a computerized system is known as


a. physical security

b. procedure

c. policy

d. access control


3. proof of identity is the additional step involved in


a. obtaining independence on the network

b. altering an employees individual access rights

c. employing authentication

d. simplifying the management of the rules


4. Which of the following is a way of simplifying the management of access controls


a. authentication

b. group access righs

c. passphrase

d. loging systems


5. Which of the following factor is not used for network and infrastructure authentication


a. something you are

b. something you have

c. something you need

d. something you know


6. Which of the following is not a primary threat to any access control system


a. password cracking

b. heightened access

c. social engineering

d Dos attacks


7. T/he qualitative risk assessment approach is a more holistic approach than the quantitative approach


a. true

b. false


8. Infrastructure authentication controls, such as workstations and servers have the ability to


a. limit who may log on

b. deny access to an authorized asset

c. easily escape network configuration management protocols

d. dynamically authenticate multiple users simulataneousy


9. Which of the following defines the purpose fo layer 5 host-based firewalls?


a. supplement border firewalls and isolate infected workstations from the rest of the intranet

b. replace border firewalls and enhance the complexity of encryption

c. allow infected workstations to securely access the intranet and summon the service desk

d quarantine the host and use NAC to eliminate the threat


10. Which of the following are the key security elements in the workstation domain?


a. virus scanning, operating system patching and application-level firewall

b. intrusion detection/prevention system e-mail scanning and server-level virus scanning

c. IP tunneling virtual private networking and creating encapsulating packets

d. patching checking for updates and keeping up with each application vendor



Explanation / Answer

true

b

c

b

a

d

false

c

a

d