Quiz 5 Coms System Security
Which security model does NOT protect the integrity of information?
Bell-LaPadula
Which type of password attack attempts all possible combinations of a password in an attempt to guess the correct value?
Brute-force attack
Which characteristic of a biometric system measures the system's accuracy using a balance of different error types?
Crossover error rate (CER)
Gary would like to choose an access control model in which the owner of a resource decides who may modify permissions on that resource. Which model fits that scenario?
Discretionary access control (DAC)
Passphrases are less secure than passwords.
False
What is a single sign-on (SSO) approach that relies upon the use of key distribution centers (KDCs) and ticket-granting servers (TGSs)?
Kerberos
Which of the following is an example of a hardware security control?
MAC filtering
Which one of the following is an example of two-factor authentication?
Smart card and personal identification number (PIN)
Content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.
True
Which one of the following is NOT a commonly accepted best practice for password security?
Use at least six alphanumeric characters.