100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Computer Security: Principles and Practice Midterm Review Questions f With Complete Solutions 100% Verified Newest 2025

Rating
5.0
(1)
Sold
1
Pages
11
Grade
A+
Uploaded on
24-01-2025
Written in
2024/2025

Computer Security: Principles and Practice Midterm Review Questions f With Complete Solutions 100% Verified Newest 2025

Institution
Computer Security
Course
Computer Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Security
Course
Computer Security

Document information

Uploaded on
January 24, 2025
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Computer Security: Principles and Practice
Midterm Review Questions f With Complete
Solutions 100% Verified Newest 2025
T -ANSWER Access control is the central element of computer security.


T -ANSWER An auditing function monitors and keeps a record of user accesses to system
resources.


T -ANSWER The principal objectives of computer security are to prevent
unauthorized users from gaining access to resources, to prevent legitimate users from
accessing resources in an unauthorized manner, and to enable legitimate users to access
resources in an authorized manner.


T -ANSWER A user may belong to multiple groups.


T -ANSWER An access right describes the way in which a subject may access an object.


F -ANSWER Traditional RBAC systems define the access rights of individual users and
groups of users.


Access control -ANSWER 1. __________ implements a security policy that specifies who
or what may have access to each specific system resource and the type of access that is
permitted in each instance.


Authentication -ANSWER __________ is verification that the credentials of a user or
other system entity are valid.

, Authorization -ANSWER _________ is the granting of a right or permission to a system
entity to access a system resource.


DAC -ANSWER __________ is the traditional method of implementing access control.


MAC -ANSWER __________ controls access based on comparing security labels with
security clearances.


mandatory access control -ANSWER A concept that evolved out of requirements for
military information security is ______ .


subject -ANSWER A __________ is an entity capable of accessing objects.


object -ANSWER A(n) __________ is a resource to which access is controlled.


RBAC -ANSWER __________ is based on the roles the users assume in a system rather
than the user's identity.


role -ANSWER A __________ is a named job function within the organization that
controls this computer system


Constraints -ANSWER __________ provide a means of adapting RBAC to the specifics of
administrative and security policies in an organization.


Cardinality -ANSWER __________ refers to setting a maximum number with respect to
roles.

Reviews from verified buyers

Showing all reviews
1 month ago

1 month ago

Thank you for the response, all the best

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUINTER New York College Of Dentistry
View profile
Follow You need to be logged in order to follow users or courses
Sold
334
Member since
2 year
Number of followers
104
Documents
38022
Last sold
1 day ago

3.4

56 reviews

5
24
4
8
3
7
2
1
1
16

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions