100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

GMU IT 223 Exam 2 (Lecture 5-9) Questions With Correct Answers.

Puntuación
-
Vendido
-
Páginas
14
Grado
A+
Subido en
29-05-2024
Escrito en
2023/2024

What is access control? - Answer-authorized entities can use a system when they need to. How is policy related to access control? - Answer-Policy driven control of access to systems, data, and dialogues. Examples of access control include barriers, passwords, and bio-metrics. What is the role of authentication in access control? - Answer-Verification (or not) of an individual's claim (usually of identity). What is the role of authorization in access control? - Answer-An entity (via his/her/its identity) is given certain permissions to access particular resources. What is the role of auditing in access control? - Answer-After-the-fact analysis of data collected about an individual's activities What are 4 different ways to authenticate a claim of identity? Can you give an example of each? - Answer-- What you know - a password for an account - What you have - a door key, a smart card - Who you are - fingerprint - What you do - how you pronounce a passphrase What is multi-factor authentication? Why is it useful? - Answer-Role Based Access Control (RBAC). Lessens number of opportunities for errors How does MFA impact the probability of a false negative result? - Answer-Increases probability of false negative How does MFA impact the probability of a false positive result? - Answer-Decreases probability of false positiveWhat is mandatory access control? - Answer-Strict access control barriers to gain Entry, no variation allowed. What is discretionary access control? - Answer-A department can decide what access to allow for each individual. How does a multi-level security (MLS) system work? - Answer-Classified information requires complex layers of control that far exceed basic clearance granting and badge granting policies. On a NTK (Need to Know) access Can you give examples of common policy requirements for physical security? - Answer-CCTV, wireless cameras, preventing dumpster diving, PC locking when leaving desk. Why is it important to consider utilities? - Answer-Electricity, water, HVAC must be supplied to adequate level, inspected and tested regularly. Also, backup generator. What are important issues to remember when disposing of computer equipment? - Answer-Ensure data destruction, keeping records of decommissioned equipment, minimize environmental liabilities, and choosing the right vendors What is the role of a password in access control? - Answer-allows you to restrict access to vital password information on a "need to know" basis. The most common form is "role-based access control" which allows you to assign broad roles (with a set of password permissions) and then assign users to those roles. Can you give examples of common policy requirements for passwords? - Answer-Changing passwords on regular intervals, not changing the password to something you've had before, at least 8 characters long, at least one change of case, at least one digit, at least one special character, and not at the end of the password. How do users sometimes misuse passwords? - Answer-Sharing passwords or accounts and reusing passwords on different systems and sites.Can you give examples of physical devices used in access control? - Answer-In Cabling Security, wiring has to be sufficiently hidden from tapping capabilities, or accidental cutting. Wiring closets locked and monitored. What is the most important issue when using physical devices in this way? - Answer-Loss and Theft are common. 2 Factor authentication eases loss or theft. What does "bio-metrics" mean literally? in the I.T. context? - Answer-based on something you are (your fingerprint, iris pattern, face, hand geometry, etc.) or something you do (write, type, walk, etc.). The major promise of bio-metrics is to make reusable passwords obsolete. The process by which a person's unique physical and other traits are detected and recorded by an electronic device or system as a means of confirming identity. Can you give examples of common bio-metric technologies? - Answer-Fingerprint recognition, iris scanning, and face recognition What are two important parts of the bio-metric process that are never perfect? - Answer-Overly exact matches cause false rejections. Too loose a matching index will cause false acceptances. What is a false acceptance rate (FAR)? - Answer-Match to a template that should not be made. What is a false rejection rate (FRR)? - Answer-rate of false acceptances as a percentage of total access attempts What are three different purposes for which bio-metric are commonly used? - Answer-Verification, supplicant is compared to table entry or template. Identification, situation where the supplicant does not state his or her identity door access.

Mostrar más Leer menos
Institución
GMU IT 223
Grado
GMU IT 223









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
GMU IT 223
Grado
GMU IT 223

Información del documento

Subido en
29 de mayo de 2024
Número de páginas
14
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$8.39
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
PatrickKaylian Delaware State University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1816
Miembro desde
2 año
Número de seguidores
1043
Documentos
22126
Última venta
4 horas hace

3.8

316 reseñas

5
147
4
60
3
54
2
15
1
40

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes