Computer Science > EXAM > CYSE 101 FINAL STUDY SET with COMPLETE SOLUTION | 275 Questions with 100% Correct Answers [BEST] (All)
What is access control? Correct Answer: A security technique that regulates who or what can view or use resources in a computing environment It enables administrators to manage access at a more gr... anular level Authentication Correct Answer: Authentication is the step after identification It is to determine whether the claim of the identity is true Because access control is typically based on the identity of the user who requests access to a resource, authentication is essential to effective security. What is the role of authorization in access control? Correct Answer: Authorization is the step after authentication. Authorization allows us to specify where the party should be allowed or denied access. What is the role of auditing in access control? Correct Answer: We perform audits to ensure that compliance with applicable laws, policies, and other bodies of administrative control is being accomplished as well as detecting misuse. We may audit a variety of activities, including compliance with policy, proper security architecture, configuration management, personal behavior of users, or other activities. What are 4 different ways to authenticate a claim of identity? Correct Answer: What you know - a password for an account What you have - a door key, a smart card Who you are - fingerprint What you do - how you pronounce a passphrase What is multi-factor authentication? Correct Answer: A method of computer access control in which a user is only granted access after successfully presenting evidence to an authentication mechanism It decreases the probability of a false positive and increases the probability of a false negative Mandatory Access Control (MAC) Correct Answer: A model of access control in which the owner of the resource does not get to decide who gets to access it, but instead access is decided by a group or individual who has the authority to set access on resources. Discretionary Access Control (DAC) Correct Answer: A model of access control based on access [Show More]
Last updated: 2 years ago
Preview 1 out of 62 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
CYSE Tests Compilation Bundle
By Crum 2 years ago
$15.5
6
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Oct 19, 2022
Number of pages
62
Written in
This document has been written for:
Uploaded
Oct 19, 2022
Downloads
0
Views
92
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·