
CIST 1601 Chapter 6 Review
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Audit trails produced by auditing activities are which type of security control?
Preventative
Directive
Deterrent
Detective
Answer explanation
Audit trails are a type of detective security control. Detective controls are implemented to identify and respond to security incidents after they have occurred. Audit trails are records of events and activities that can be used to track and analyze security-related events in a system or network. They provide a historical record of activities, which can be crucial for investigating security incidents, monitoring compliance, and identifying potential security issues.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which access control model is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject?
Attribute-Based Access Control (ABAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control
Answer explanation
The access control model that is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject is known as the Attribute-Based Access Control (ABAC) model.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is used for identification?
username
password
PIN
cognitive question
Answer explanation
The element used for identification among the options provided is the "Username." The username is a unique identifier associated with a user account and is typically used during the authentication process to uniquely identify the user. Usernames are often combined with other authentication factors, such as passwords or PINs, to verify the user's identity.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You are concerned that the accountant in your organization might have the chance to modify financial information and steal from the company. You want to periodically have another person take over all accounting responsibilities to catch any irregularities. Which security principle are you implementing by periodically shifting accounting responsibilities?
Job rotation
Need to Know
Principle of least privilege
Explicit deny
Separation of duties
Answer explanation
Job rotation is a practice where employees are periodically moved or rotated through different positions or tasks within an organization. This helps in reducing the risk of fraud or errors by ensuring that no single individual has prolonged access or control over sensitive functions.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An access control list (ACL) contains a list of users and allowed permissions. What is it called if the ACL automatically prevents access to anyone who is not on the list?
Implicit deny
Explicit deny
Implicit allow
Explicit allow
Answer explanation
If an Access Control List (ACL) automatically prevents access to anyone who is not on the list, it is referred to as "Implicit deny." Implicit deny is a default rule in many access control systems that denies access by default unless there is an explicit rule granting access.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following principles is implemented in a mandatory access control model to determine object access by classification level?
separation of duties
clearance
need to know
ownership
principle of least privilege
Answer explanation
The "Need to Know" principle ensures that individuals are granted access to information or resources based on their specific job responsibilities and the necessity to perform their duties. In a mandatory access control model, access decisions are often based on security clearances and the classification level of information.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with?
job rotation
principle of least privilege
cross-training
need to know
Answer explanation
The Principle of least privilege is a security concept that advocates providing individuals with the minimum level of access or permissions necessary to perform their job functions and tasks. By adhering to this principle, you reduce the potential for unauthorized access and limit the impact of security incidents or breaches.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
11 questions
What is a computer
Quiz
•
KG - University
16 questions
Algo Quiz
Quiz
•
University
10 questions
Server Administration- Quiz 1
Quiz
•
12th Grade - University
11 questions
Computer Science (1-9) - Identifying & Preventing Threats
Quiz
•
University
14 questions
Semi-Long Quiz#1 - SAM, NW3A-3E
Quiz
•
University
13 questions
Computer Science: CPU performance
Quiz
•
University
12 questions
CIS1103 Week 9_10 CLO3 Part 1
Quiz
•
University
18 questions
Quiz on Misinformation and Bias
Quiz
•
10th Grade - University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Computers
20 questions
Disney Trivia
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
14 questions
Ch.3_TEACHER-led
Quiz
•
University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University