practice quiz 3 - Info Security
Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of access control is Ed concerned about?
Accountability
During which phase of the access control process does the system answer the question, "What can the requestor access?"
Authorization
Which type of password attack attempts all possible combinations of a password in an attempt to guess the correct value?
Brute-force attack
Gary would like to choose an access control model in which the owner of a resource decides who may modify permissions on that resource. Which model fits that scenario?
Dictionary access control (DAC)
Passphrases are less secure than passwords
False
The four central components of access control are users, resources, actions, and features.
False
Voice pattern biometrics are accurate for authentication because voices can't easily be replicated by computer software.
False
Which of the following is NOT a benefit of cloud computing to organizations?
Lower dependence on outside vendors
Which one of the following is an example of a logical access control?
Password
Which one of the following is an example of two-factor authentication?
Smart card and personal identification number (PIN)