practice quiz 3 - Info Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of access control is Ed concerned about?

Accountability

During which phase of the access control process does the system answer the question, "What can the requestor access?"

Authorization

Which type of password attack attempts all possible combinations of a password in an attempt to guess the correct value?

Brute-force attack

Gary would like to choose an access control model in which the owner of a resource decides who may modify permissions on that resource. Which model fits that scenario?

Dictionary access control (DAC)

Passphrases are less secure than passwords

False

The four central components of access control are users, resources, actions, and features.

False

Voice pattern biometrics are accurate for authentication because voices can't easily be replicated by computer software.

False

Which of the following is NOT a benefit of cloud computing to organizations?

Lower dependence on outside vendors

Which one of the following is an example of a logical access control?

Password

Which one of the following is an example of two-factor authentication?

Smart card and personal identification number (PIN)


Conjuntos de estudio relacionados

Chapter 30: Atraumatic Care of Children and Families

View Set

Mgt. of Information Security - FINAL

View Set

Spanish 1B: Unit 3: Chapters 11-15

View Set

Organizational Communication- Exam 1- OU

View Set

Module 5 - Types of Economic Systems and Examples

View Set

Chapter 10: Fetal Development and Genetics

View Set

Dorman: Emergency Medicine EOR Practice Exam (Rosh Review)

View Set

Unit 1, Period 1: Native American Societies before European Contact through Permanent English Settlement, 1491 - 1607

View Set

ACCT 308 Exam 1 Homework Questions

View Set