Quiz 5 Coms System Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which security model does NOT protect the integrity of information?

Bell-LaPadula

Which type of password attack attempts all possible combinations of a password in an attempt to guess the correct value?

Brute-force attack

Which characteristic of a biometric system measures the system's accuracy using a balance of different error types?

Crossover error rate (CER)

Gary would like to choose an access control model in which the owner of a resource decides who may modify permissions on that resource. Which model fits that scenario?

Discretionary access control (DAC)

Passphrases are less secure than passwords.

False

What is a single sign-on (SSO) approach that relies upon the use of key distribution centers (KDCs) and ticket-granting servers (TGSs)?

Kerberos

Which of the following is an example of a hardware security control?

MAC filtering

Which one of the following is an example of two-factor authentication?

Smart card and personal identification number (PIN)

Content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.

True

Which one of the following is NOT a commonly accepted best practice for password security?

Use at least six alphanumeric characters.


Conjuntos de estudio relacionados

Exam 1 The Structure of Neurons to Action Potential

View Set

Chapter 19: Nursing Management of Pregnancy at Risk: Pregnancy-Related Complications

View Set

Ch. 19: Documenting and Reporting

View Set

The Psy of Relationships Mid-term

View Set

Chapter 58: Assessment and Management of Patients With Breast Disorders

View Set

Chapter 5 Test Study Guide (History)

View Set