CIST 1601 Chapter 6 Review

CIST 1601 Chapter 6 Review

University

14 Qs

quiz-placeholder

Similar activities

ITS63604_OS_Processes

ITS63604_OS_Processes

University

10 Qs

OSI Model

OSI Model

University - Professional Development

18 Qs

InfoSec: Access Control Methods

InfoSec: Access Control Methods

10th Grade - University

10 Qs

Access Control Quiz

Access Control Quiz

University

15 Qs

011_Technical Change Management-CompTIA Security+ SY0-701-1.3

011_Technical Change Management-CompTIA Security+ SY0-701-1.3

12th Grade - University

15 Qs

Introduction to Database

Introduction to Database

University

10 Qs

Week 2- lecture Database system

Week 2- lecture Database system

University

9 Qs

OSI Model - Data Link Layer

OSI Model - Data Link Layer

9th Grade - Professional Development

10 Qs

CIST 1601 Chapter 6 Review

CIST 1601 Chapter 6 Review

Assessment

Quiz

Computers

University

Hard

Used 1+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Audit trails produced by auditing activities are which type of security control?

Preventative

Directive

Deterrent

Detective

Answer explanation


Audit trails are a type of detective security control. Detective controls are implemented to identify and respond to security incidents after they have occurred. Audit trails are records of events and activities that can be used to track and analyze security-related events in a system or network. They provide a historical record of activities, which can be crucial for investigating security incidents, monitoring compliance, and identifying potential security issues.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Which access control model is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject?

Attribute-Based Access Control (ABAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

Rule-Based Access Control

Answer explanation


The access control model that is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject is known as the Attribute-Based Access Control (ABAC) model.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Which of the following is used for identification?

username

password

PIN

cognitive question

Answer explanation

The element used for identification among the options provided is the "Username." The username is a unique identifier associated with a user account and is typically used during the authentication process to uniquely identify the user. Usernames are often combined with other authentication factors, such as passwords or PINs, to verify the user's identity.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

You are concerned that the accountant in your organization might have the chance to modify financial information and steal from the company. You want to periodically have another person take over all accounting responsibilities to catch any irregularities. Which security principle are you implementing by periodically shifting accounting responsibilities?

Job rotation

Need to Know

Principle of least privilege

Explicit deny

Separation of duties

Answer explanation

Job rotation is a practice where employees are periodically moved or rotated through different positions or tasks within an organization. This helps in reducing the risk of fraud or errors by ensuring that no single individual has prolonged access or control over sensitive functions.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

An access control list (ACL) contains a list of users and allowed permissions. What is it called if the ACL automatically prevents access to anyone who is not on the list?


Implicit deny

Explicit deny

Implicit allow

Explicit allow

Answer explanation


If an Access Control List (ACL) automatically prevents access to anyone who is not on the list, it is referred to as "Implicit deny." Implicit deny is a default rule in many access control systems that denies access by default unless there is an explicit rule granting access.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Which of the following principles is implemented in a mandatory access control model to determine object access by classification level?

separation of duties

clearance

need to know

ownership

principle of least privilege

Answer explanation

The "Need to Know" principle ensures that individuals are granted access to information or resources based on their specific job responsibilities and the necessity to perform their duties. In a mandatory access control model, access decisions are often based on security clearances and the classification level of information.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with?

job rotation

principle of least privilege

cross-training

need to know

Answer explanation

The Principle of least privilege is a security concept that advocates providing individuals with the minimum level of access or permissions necessary to perform their job functions and tasks. By adhering to this principle, you reduce the potential for unauthorized access and limit the impact of security incidents or breaches.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?