Computer Science > EXAM > CYSE 101 FINAL STUDY SET with COMPLETE SOLUTION | 275 Questions with 100% Correct Answers [BEST] (All)

CYSE 101 FINAL STUDY SET with COMPLETE SOLUTION | 275 Questions with 100% Correct Answers [BEST]

Document Content and Description Below

What is access control? Correct Answer: A security technique that regulates who or what can view or use resources in a computing environment It enables administrators to manage access at a more gr... anular level Authentication Correct Answer: Authentication is the step after identification It is to determine whether the claim of the identity is true Because access control is typically based on the identity of the user who requests access to a resource, authentication is essential to effective security. What is the role of authorization in access control? Correct Answer: Authorization is the step after authentication. Authorization allows us to specify where the party should be allowed or denied access. What is the role of auditing in access control? Correct Answer: We perform audits to ensure that compliance with applicable laws, policies, and other bodies of administrative control is being accomplished as well as detecting misuse. We may audit a variety of activities, including compliance with policy, proper security architecture, configuration management, personal behavior of users, or other activities. What are 4 different ways to authenticate a claim of identity? Correct Answer: What you know - a password for an account What you have - a door key, a smart card Who you are - fingerprint What you do - how you pronounce a passphrase What is multi-factor authentication? Correct Answer: A method of computer access control in which a user is only granted access after successfully presenting evidence to an authentication mechanism It decreases the probability of a false positive and increases the probability of a false negative Mandatory Access Control (MAC) Correct Answer: A model of access control in which the owner of the resource does not get to decide who gets to access it, but instead access is decided by a group or individual who has the authority to set access on resources. Discretionary Access Control (DAC) Correct Answer: A model of access control based on access [Show More]

Last updated: 2 years ago

Preview 1 out of 62 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Also available in bundle (1)

CYSE Tests Compilation Bundle

CYSE Tests Compilation Bundle

By Crum 2 years ago

$15.5

6  

Reviews( 0 )

$12.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

92
0

Document information


Connected school, study & course


About the document


Uploaded On

Oct 19, 2022

Number of pages

62

Written in

Seller


seller-icon
Crum

Member since 3 years

64 Documents Sold

Reviews Received
10
1
1
0
1
Additional information

This document has been written for:

Uploaded

Oct 19, 2022

Downloads

 0

Views

 92

Document Keyword Tags

Recommended For You

Get more on EXAM »

$12.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·