testout 6
Across
- 3. Which of the following terms is used to describe an event in which a person who should be allowed access is denied access to a system?
- 4. Which of the following identification and authentication factors are often well known or easily discovered by others on the same network or system?
- 6. Which type of group can be used for controlling access to objects?
- 9. Which networking model is based on peer-to-peer networking?
- 12. Audit trails produced by auditing activities are which type of security control?
- 13. You have implemented an access control method that only allows users who are managers to access specific data. Which type of access control model is being used?
- 14. Which access control model is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject?
- 15. Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?
Down
- 1. What type of password is maryhadalittlelamb?
- 2. Which of the following is a password that relates to things that people know, such as a mother's maiden name or a pet's name?
- 5. Which of the following principles is implemented in a mandatory access control model to determine object access by classification level?
- 7. Which account type in Linux can modify hard limits using the ulimit command?
- 8. a remote access user needs to gain access to resources on the server. Which of the following processes are performed by the remote access server to control access to resources?
- 10. What is used for identification?
- 11. What is the MOST important aspect of a biometric device?