Answers |Actual Complete Exam| Already Graded A+
1. Three Areas of In- People - Authentication & Authorization
formation Securi- Data - Prevention & Resistance
ty: People, Attacks - Detection & Response
Data, and
Attacks
2. Differentiate four 1. Mandatory access control
Access Control 2. Discretionary access control
Models
3. Role-based access control
4. Rule-based access control
3. Authentication a method for confirming users' identities. Once a system determines
the authen- tication of a user, it can then determine the access
privileges (or authorization) for that user.
4. single-factor au- traditional security process that requires a user name and password
thentication
5. Authorization The process of providing a user with permission including access levels
and
abilities such as file access, hours of access, and amount of allocated
storage space.
6. Biometrics the identification of a user based on a physical characteristic, such as a
fingerprint, iris, face, voice, or handwriting
7. Content Filtering occurs when organizations use software that filters content, such as
emails, to
prevent the accidental or malicious transmission of unauthorized information
8. Discretionary its the least restrictive. It allows the owner or administrator of the system
ac- cess control
complete control over who has access and permissions through the
system
9. Encryption scrambles information into an alternative form that requires a key or
password to decrypt
1/
31
, CIS Exam 3 Study Guide with all Correct & 100% Verified
Answers |Actual Complete Exam| Already Graded A+
10. Firewall
2/
31
, CIS Exam 3 Study Guide with all Correct & 100% Verified
Answers |Actual Complete Exam| Already Graded A+
private network by analyzing incoming and outgoing information for appropriate
markings
11. Intrusion
Detec- tion features full-time monitoring tools that search for patterns in network traflc to
System identify intruders3
12. Intrusion Preven- is a network security appliance that monitors network and system activitie
to
tion System detect possible intrusions.
13. Mandatory Most restrictive from the four access controls. It gives control and
Ac- cess
management of the system and access points to only the system
Control
owner or administrator
14. Non-repudiation is a mechanism to ensure that individuals cannot deny their actions.
examples
include ensuring that users who spend money cannot "repudiate" that
they really did not authorize a transaction
15. Password the identification of a user based on what a person knows
16. Public Key Type of encryption technology uses multiple keys, one for the sender and
En- cryption
a ditterent one for the receiver
17. Role-based ac-
cess control its one of the most popular. RBAC assigns permission based on the
position or role a user holds within the organization
18. Rule-based ac-
cess control
allows the system owner and administrators to set rules and limitations
on per- missions as needed.
19. Tokens small electronic devices that change user passwords automatically. The us
enters his or her user ID and token-displayed password to gain access to
the network
20. BPMN notation event, activity, gateway,
3/
31
, CIS Exam 3 Study Guide with all Correct & 100% Verified
Answers |Actual Complete Exam| Already Graded A+
flow 21.
4/
31