Filters
Question type

Study Flashcards

The authentication function determines who is trusted for a given purpose.

Correct Answer

verifed

verified

Any program that is owned by,and SetUID to,the "superuser" potentially grants unrestricted access to the system to any user executing that program.

Correct Answer

verifed

verified

_________ is the granting of a right or permission to a system entity to access a system resource.


A) Authorization
B) Authentication
C) Control
D) Monitoring

Correct Answer

verifed

verified

A

The __________ user ID is exempt from the usual file access control constraints and has system wide access.

Correct Answer

verifed

verified

A constraint is a defined relationship among roles or a condition related to roles.

Correct Answer

verifed

verified

Access control is the central element of computer security.

Correct Answer

verifed

verified

__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.


A) Constraints
B) Mutually Exclusive Roles
C) Cardinality
D) Prerequisites

Correct Answer

verifed

verified

A __________ is a named job function within the organization that controls this computer system.


A) user
B) role
C) permission
D) session

Correct Answer

verifed

verified

B

Security labels indicate which system entities are eligible to access certain resources.

Correct Answer

verifed

verified

A user program executes in a kernel mode in which certain areas of memory are protected from the user's use and certain instructions may not be executed.

Correct Answer

verifed

verified

The final permission bit is the _________ bit.


A) superuser
B) kernel
C) set user
D) sticky

Correct Answer

verifed

verified

A(n) __________ is a resource to which access is controlled.


A) object
B) owner
C) world
D) subject

Correct Answer

verifed

verified

A __________ is an object or data structure that authoritatively binds an identity to a token possessed and controlled by a subscriber.

Correct Answer

verifed

verified

__________ controls access based on comparing security labels with security clearances.


A) MAC
B) DAC
C) RBAC
D) MBAC

Correct Answer

verifed

verified

T F 4.External devices such as firewalls cannot provide access control services.

Correct Answer

verifed

verified

__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.


A) Audit control
B) Resource control
C) System control
D) Access control

Correct Answer

verifed

verified

D

X.800 defines __________ as the prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.

Correct Answer

verifed

verified

An auditing function monitors and keeps a record of user accesses to system resources.

Correct Answer

verifed

verified

Subject attributes,object attributes and environment attributes are the three types of attributes in the __________ model.


A) DSD
B) RBAC
C) ABAC
D) SSD

Correct Answer

verifed

verified

An independent review and examination of system records and activities in order to test for adequacy of system controls,to ensure compliance with established policy and operational procedures,to detect breaches in security,and to recommend any indicated changes in control,policy and procedures is a(n)__________ .

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer