
IAS Finals Reviewer
Authored by Kalo
Computers
University
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
method by which systems determine whether and how to admit a user into a trusted area of the organization—that is, information systems, restricted areas such as computer rooms, and the entire physical location.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In information security, a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
private data network that uses the public telecommunications infrastructure to create a means for private communication via a tunneling protocol coupled with security procedures
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In general, all access control approaches rely on the following four mechanisms, which represent the four fundamental functions of access control systems:
Identification, Authentication, Authorization,
Accountability
Authentication, Authorization, Auditing, Encryption
Identification, Validation, Permission, Monitoring
Authentication, Authorization, Auditing, Accountability
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are architectural implementations of firewalls?
Single Bastion Hosts, Screened Host Firewalls, Screened Subnet Firewalls
Network-based, Host-based, Application-based
Static, Dynamic, Hybrid
Inbound, Outbound, Bothway
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The general term for a system that can both detect and modify its configuration and environment to prevent intrusions. It encompasses the functions of both intrusion detection systems and intrusion prevention technology.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An adverse event in which an attacker attempts to gain entry into an information system or disrupt its normal operations, almost always with the intent to do harm.
Intrusion
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?