Quiz #4 – Flashcards

Unlock all answers in this set

Unlock answers
question
An access control list (ACL) is used by an operating system to provide several options to associate permissions with objects.
answer
True
question
________ is an authentication credential that is generally longer and more complex than a password.
answer
A passphrase
question
________ is an authorization method in which access to resources is decided by the user's formal status.
answer
Authority-level policy
question
What term describes a device used as a logon authenticator for remote users of a network?
answer
Synchronous token
question
Role-based access control (RBAC) refers to limiting users' access to database views, as opposed to allowing users to access data in database tables directly.
answer
False
question
Regarding synchronous tokens, a time-based synchronization system uses the current time as the input value.
answer
True
question
A security kernel database contains rules that determine individual users' access rights.
answer
True
question
A community cloud provides services for several organizations, which share the cloud environment and use it for their specific needs.
answer
True
question
A method of restricting resource access to specific periods of time is called ________.
answer
temporal isolation
question
Which of the following is NOT a type of authentication?
answer
Identification
question
View-based access control (VBAC) limits users' access to database views, as opposed to allowing users to access data in database tables directly.
answer
True
question
This device uses public key infrastructure (PKI) technology (for example, a certificate signed by a trusted certification authority) and doesn't provide one-time passwords.
answer
USB token
question
_____________is the process of dividing a task into a series of unique activities performed by different people, each of whom is allowed to execute only one part of the overall task.
answer
Separation of duties
question
Which of the following defines decentralized access control?
answer
A system that puts access control into the hands of people such as department managers who are closest to system users; there is no one centralized entity to process access requests in this system
question
Public clouds contain components of more than one type of cloud, including private and community.
answer
False
question
In mandatory access control (MAC), sensitivity labels are applied to all subjects (users or programs) and privilege labels are assigned to all objects (resources).
answer
False
question
A mechanism that limits access to computer systems and network resources is a(n) ________.
answer
logical access control
question
The Bell-La Padula access control model focuses primarily on ________.
answer
the confidentiality of data and control of access to classified information
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New