testout 6

123456789101112131415
Across
  1. 3. Which of the following terms is used to describe an event in which a person who should be allowed access is denied access to a system?
  2. 4. Which of the following identification and authentication factors are often well known or easily discovered by others on the same network or system?
  3. 6. Which type of group can be used for controlling access to objects?
  4. 9. Which networking model is based on peer-to-peer networking?
  5. 12. Audit trails produced by auditing activities are which type of security control?
  6. 13. You have implemented an access control method that only allows users who are managers to access specific data. Which type of access control model is being used?
  7. 14. Which access control model is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject?
  8. 15. Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?
Down
  1. 1. What type of password is maryhadalittlelamb?
  2. 2. Which of the following is a password that relates to things that people know, such as a mother's maiden name or a pet's name?
  3. 5. Which of the following principles is implemented in a mandatory access control model to determine object access by classification level?
  4. 7. Which account type in Linux can modify hard limits using the ulimit command?
  5. 8. a remote access user needs to gain access to resources on the server. Which of the following processes are performed by the remote access server to control access to resources?
  6. 10. What is used for identification?
  7. 11. What is the MOST important aspect of a biometric device?