EXAM
The primary file-access rights in Unix are:
Read, Control and Write
Today's access control lists (ACLs) implement one of several
designs. Pick the designs from the following list:
All of the above
Regarding access permissions in Windows, the owner of a shared
folder may read, modify, and delete other user's files.
true
Regarding access permissions in Windows, the owner of a shared
folder may read, modify, and delete other user's files.
true
Both Windows and Unix include permission flags in their file
security mechanisms.
false
Mac OS-X allows you to add ACL entries for groups as well as
users.
true
Windows does not deny an access right by omitting it, but it allows
you to explicitly deny a right.
true
END OF
PAGE
1
, ITN 262 MIDTERM LATEST
EXAM
PCI DSS is a set of standards, not a law, that applies to merchants
who handle customer credit card information.
true
In Unix the command "Chmod" Changes the rights granted to the
owner, group, or rest of the world, for a file
true
In Unix the command "Chown" Changes the identity of a file's
owner.
true
Trojan horse software illustrates a common shortcoming of file-
based access control.
true
Using a personal computer with full admin rights does not enable
the user to minimize security threats
true
Transitive trust is describes as:
The implicit spreading of trust
An Audit trails are records in a set of files called:
event log
Examples of tailored policies are:
END OF
PAGE
2
, ITN 262 MIDTERM LATEST
EXAM
all of the above
Some operating systems provide ways of temporarily granting
administrative to people logged in to regular accounts.
true
When something important (an event) takes place inside a program,
the program creates:
log entries
An individual/owner with full rights to read, modify or delete
anything in a folders, is said to have:
owner rights
What are the fundamental or cornerstone principles of information
security?
Confidentiality, Integrity and Availability
A personal laptop is something you own and possess. A company
laptop or cell phone is something you possess. Can you install,
modify or update software applications on a company laptop or any
other company-own mobile device?
END OF
PAGE
3