MISY 5325 - Ch. 9 Access Control Management questions and answers graded A+ 2023
MISY 5325 - Ch. 9 Access Control Management Mandatory access control - correct answer Which of the following is a type of access control that is defined by a policy and cannot be changed by the information owner? Enclave network - correct answer Which of the following network types is a segment of the internal network that requires a high degree of protection? A smartcard and a retina scan - correct answer Which of the following is an example of a multifactor authentication? Role-based access control - correct answer Which of the following is an access control that is based on a specific job role or function? Authentication by characteristic - correct answer Using a palm scan for authentication is an example of which of the following? Remote access portal - correct answer Which of the following provides access to one or more applications through a single centralized interface? Fingerprint scan - correct answer Which of the following is an example of authentication by characteristic? Two individuals must both complete their half of a specific task. - correct answer Which of the following statements best describes an administrative account control called dual control? Multilayer authentication - correct answer Using a smartcard and a one-time passcode is an example of which of the following authentication methods? Access controls - correct answer security features that govern how users and processes communicate and interact with systems and resources The primary objective of access controls is to - correct answer protect information and information systems from unauthorized access (confidentiality), modification (integrity), or disruption (availability). subject - correct answer the active entity (that is, the user or system) that requests access to a resource or data object - correct answer the passive entity being accessed or being acted upon the three common attributes of all access controls - correct answer • An identification scheme • an authentication method • an authorization model identification scheme - correct answer used to identify unique records in a set, such as a username Identification - correct answer process of the subject supplying an identifier to the object authentication method - correct answer how identification is proven to be genuine Authentication - correct answer the process of the subject supplying verifiable credentials to the object Authorization - correct answer the process of assigning authenticated subjects the permission to carry out a specific operation. identity management - correct answer The process for identifying, authenticating and authorizing users or groups of users to have access to applications, systems or networks
Written for
- Institution
- MISY
- Course
- MISY
Document information
- Uploaded on
- November 3, 2023
- Number of pages
- 7
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
misy 5325 ch 9 access control management
Also available in package deal