CIS 333 Midterm ExamCIS 333 Midterm Exam
CIS 333 Midterm Exam Question 1 You log onto a network and are asked to present a combination of elements, such as user name, password, token, smart card, or biometrics. This is an example of which of the following? Answer Correct Answer: Logical access controls Question 2 An attacker enters more characters than expected into an input field, causing a buffer overflow and allowing malicious code to spread throughout the application. How has company access control been compromised? Answer Correct Answer: Exploiting applications Question 3 Identify two phases of the access control process. Answer Correct Answer: Identification and authorization Question 4 Which of the following access control models is based on a mathematical theory published in 1989 to ensure fair competition? Answer Correct Answer: Brewer and Nash Integrity Model
Escuela, estudio y materia
- Institución
- Strayer University
- Grado
- CIS 333
Información del documento
- Subido en
- 8 de enero de 2022
- Número de páginas
- 5
- Escrito en
- 2021/2022
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
cis 333 midterm exam
-
which of the following access control models is based on a mathematical theory published in 1989 to ensure fair competition
-
you log onto a network and are asked to present a comb