In an organization where there are frequent personnel c…
In an organization where there are frequent personnel changes, non-discretionary access control using Role
Based Access Control (RBAC) is useful because:
The access controls may be based on:
In non-discretionary access control using Role Based Access Control (RBAC), a central authority determineswhat subjects can have access to certain objects based on the organizational security policy. The access
controls may be based on:
In the Bell-LaPadula model, the *-property is also called:
In the Bell-LaPadula model, the *-property is also called:
This accountability is accomplished:
Controls provide accountability for individuals who are accessing sensitive information. This accountability is
accomplished:
Which of the following statements pertaining to these t…
Logical or technical controls involve the restriction of access to systems and the protection of information.
Which of the following statements pertaining to these types of controls is TRUE?
Which access control method would be BEST for this scenario?
Suppose you are a domain administrator and are choosing an employee to carry out backups. Which access
control method would be BEST for this scenario?
Which access control method allows the data owner (the …
Which access control method allows the data owner (the person who created the file) to control access to the
information they own?
which is described as such?
Of the seven types of Access Control Categories, which is described as such?
Designed to specify rules of acceptable behavior in the organization.
Example: Policy stating that employees may not spend time on social media websites
Data which is properly secured and can be described with terms…?
Data which is properly secured and can be described with terms like genuine or not corrupted from the original
refers to data that has a high level of what?
How can you BEST explain this?
You wish to make use of “port knocking” technologies. How can you BEST explain this?