Deliver to 
Free Shipping
  • Served Customers
  • Secure Payments
  • Served Customers
24/7 Live Chat
Computer Security Principles And Practice 3rd Edition By Stalling  Test Bank 0
Computer Security Principles And Practice 3rd Edition By Stalling  Test Bank 0

Computer Security Principles And Practice 3rd Edition by Stalling - Test Bank

ExamExperts
40 sales
NaN
$12.00 
 & Instant Download
Payment Methods:
About this item

Chapter 4 – Access Control

TRUE/FALSE QUESTIONS:

T          F          1.   Access control is the central element of computer security.

T          F          2.   The authentication function determines who is trusted for a given purpose.

T          F          3.   An auditing function monitors and keeps a record of user accesses to       

      system resources.

T          F          4.   External devices such as firewalls cannot provide access control services.

T          F          5.   The principal objectives of computer security are to prevent

unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.

T          F          6.  Security labels indicate which system entities are eligible to access certain

     resources.

T          F          7.  Reliable input is an access control requirement.

T          F          8.  A user may belong to multiple groups.

T          F          9.  An access right describes the way in which a subject may access an object.

T          F          10.  The default set of rights should always follow the rule of least privilege or        

       read-only access

T          F          11.  A user program executes in a kernel mode in which certain areas of memory

are protected from the user’s use and certain instructions may not be executed.

T          F          12.  Any program that is owned by, and SetUID to, the “superuser” potentially

       grants unrestricted access to the system to any user executing that program.

T          F          13.  Traditional RBAC systems define the access rights of individual users and

       groups of users.

T          F          14.  A constraint is a defined relationship among roles or a condition related to  

                               roles.

T          F          15.  An ABAC model can define authorizations that express conditions on

       properties of both the resource and the subject.

MULTIPLE CHOICE QUESTIONS:

1.     __________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A.  Audit control                     B.  Resource control

C.  System control                  D.  Access control

2.  __________ is verification that the credentials of a user or other system entity are valid.

                  A.  Adequacy                          B.  Authentication

                  C.  Authorization                    D.  Audit

3.  _________ is the granting of a right or permission to a system entity to access a system resource.

                  A.  Authorization                    B.  Authentication

                  C.  Control                              D.  Monitoring

4.  __________ is the traditional method of implementing access control.

                  A.  MAC                                 B.  RBAC

                  C.  DAC                                  D.  MBAC

5.  __________ controls access based on comparing security labels with security clearances.

                  A.  MAC                                 B.  DAC

                  C.  RBAC                               D.  MBAC

6.  A concept that evolved out of requirements for military information security is ______ .

                  A.  reliable input                                 B.  mandatory access control

                  C.  open and closed policies               D.  discretionary input

7.  A __________ is an entity capable of accessing objects.

                  A.  group                                 B.  object

                  C.  subject                               D.  owner

8.  A(n) __________ is a resource to which access is controlled.

                  A.  object                                B.  owner

                  C.  world                                 D.  subject

9.  The final permission bit is the _________ bit.

                  A.  superuser                           B.  kernel

                  C.  set user                              D.  sticky

10.  __________ is based on the roles the users assume in a system rather than the user’s identity.

                  A.  DAC                                  B.  RBAC

                  C.  MAC                                 D.  URAC

11.  A __________ is a named job function within the organization that controls this computer system.

                  A.  user                                   B.  role

                  C.  permission                         D. session

12.  __________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.

                  A.  Constraints                        B.  Mutually Exclusive Roles

                  C.  Cardinality                        D.  Prerequisites

13.  __________ refers to setting a maximum number with respect to roles.

                  A.  Cardinality                        B.  Prerequisite

                  C.  Exclusive                           D.  Hierarchy

14.  Subject attributes, object attributes and environment attributes are the three types of          attributes in the __________ model.

                  A.  DSD                                  B.  RBAC

                  C.  ABAC                               D.  SSD

15.  The __________ component deals with the management and control of the

 ways entities are granted access to resources.

                  A.  resource management                   B.  access management

                        C.  privilege management                  
free shipping

Free Shipping

24/7 chat

24/7 Live Chat

30 day returns

Secure Payments

Questions 

No reviews

This product has no reviews yet