Network Security Fundamentals
(MindTap Course List) 8th Edition
with complete solution latest
What kind of attack allows for the construction of LDAP statements based on user input
statements, which can then be used to access the LDAP database or modify the
database's information? - ANSWERS--LDAP injection
A vulnerable process that is divided between two or more individuals to prevent
fraudulent application of the process is known as: - ANSWERS--Separation of duties
When using Role Based Access Control (RBAC), permissions are assigned to which of
the following? - ANSWERS--roles
The action that is taken by a subject over an object is called a(n): - ANSWERS--
operation
What authentication service commonly used on UNIX devices involves communicating
user authentication information to a centralized server? - ANSWERS--TACACS
Although designed to support remote dial-in access to a corporate network, what
service below is commonly used with 802.1x port security for both wired and wireless
LANs? - ANSWERS--RADIUS
What is the name for a predefined framework that can be used for controlling access,
and is embedded into software and hardware?
accounting and access model
user control model
access control model