Audit trails produced by auditing activities are which type of security control?

CIST 1601 Chapter 6 Review

Quiz
•
Computers
•
University
•
Hard
Used 1+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Preventative
Directive
Deterrent
Detective
Answer explanation
Audit trails are a type of detective security control. Detective controls are implemented to identify and respond to security incidents after they have occurred. Audit trails are records of events and activities that can be used to track and analyze security-related events in a system or network. They provide a historical record of activities, which can be crucial for investigating security incidents, monitoring compliance, and identifying potential security issues.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which access control model is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject?
Attribute-Based Access Control (ABAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control
Answer explanation
The access control model that is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject is known as the Attribute-Based Access Control (ABAC) model.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is used for identification?
username
password
PIN
cognitive question
Answer explanation
The element used for identification among the options provided is the "Username." The username is a unique identifier associated with a user account and is typically used during the authentication process to uniquely identify the user. Usernames are often combined with other authentication factors, such as passwords or PINs, to verify the user's identity.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You are concerned that the accountant in your organization might have the chance to modify financial information and steal from the company. You want to periodically have another person take over all accounting responsibilities to catch any irregularities. Which security principle are you implementing by periodically shifting accounting responsibilities?
Job rotation
Need to Know
Principle of least privilege
Explicit deny
Separation of duties
Answer explanation
Job rotation is a practice where employees are periodically moved or rotated through different positions or tasks within an organization. This helps in reducing the risk of fraud or errors by ensuring that no single individual has prolonged access or control over sensitive functions.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
An access control list (ACL) contains a list of users and allowed permissions. What is it called if the ACL automatically prevents access to anyone who is not on the list?
Implicit deny
Explicit deny
Implicit allow
Explicit allow
Answer explanation
If an Access Control List (ACL) automatically prevents access to anyone who is not on the list, it is referred to as "Implicit deny." Implicit deny is a default rule in many access control systems that denies access by default unless there is an explicit rule granting access.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following principles is implemented in a mandatory access control model to determine object access by classification level?
separation of duties
clearance
need to know
ownership
principle of least privilege
Answer explanation
The "Need to Know" principle ensures that individuals are granted access to information or resources based on their specific job responsibilities and the necessity to perform their duties. In a mandatory access control model, access decisions are often based on security clearances and the classification level of information.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with?
job rotation
principle of least privilege
cross-training
need to know
Answer explanation
The Principle of least privilege is a security concept that advocates providing individuals with the minimum level of access or permissions necessary to perform their job functions and tasks. By adhering to this principle, you reduce the potential for unauthorized access and limit the impact of security incidents or breaches.
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Q1 - Python

Quiz
•
University
15 questions
Access Control Quiz

Quiz
•
University
10 questions
Introduction to MS Access 2013

Quiz
•
7th Grade - University
10 questions
Introduction to database systems

Quiz
•
University
10 questions
J277 - 1.6 - Technology and the Law

Quiz
•
10th Grade - University
10 questions
Cloud Computing

Quiz
•
University - Professi...
10 questions
Cloud Computing

Quiz
•
University
15 questions
Living in the IT Era - Q1

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade