Chapter 5 reading

Ace your homework & exams now with Quizwiz!

Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of access control is Ed concerned about?

Accountability

1. During which phase of the access control process does the system answer the question,"What can the requestor access?"

Authorization

Which type of password attack attempts all possible combinations of a password in an attempt to guess the correct value?

Brute-force attack

Which characteristic of a biometric system measures the system's accuracy using a balance of different error types?

Crossover error rate (CER)

Which type of authentication includes smart cards?

Ownership

Which one of the following is an example of a logical access control?

Password

1. The ___________ is the central part of a computing environment's hardware, software, and firmware that enforces access control.

Security Kernel

1. Which one of the following is an example of two-factor authentication?

Smart card and personal identification number (PIN)

1. A dictionary attack works by hashing all the words in a dictionary and then comparing the hashed value with the system password file to discover a match.

True

Which one of the following is NOT a commonly accepted best practice for password security?

Use at least six alphanumeric characters.


Related study sets

Data Structures and Algorithms I - C949

View Set

Social Psych Ch. 11 Prosocial Behavior

View Set