CI 119 Chapter 5-6 Review Questions

7 September 2022
4.7 (114 reviews)
31 test answers

Unlock all answers in this set

Unlock answers (27)
question
Which of the following is the definition of access control?
answer
The process of protecting a resource so that it is used only by those allowed to use it; a particular method used to restrict or allow access to resources.
question
What term is used to describe associating actions with users for later reporting and research?
answer
accountability
question
Which of the following adequately defines continuous authentication?
answer
An authentication method in which a user is authenticated at multiple times or event intervals.
question
A mechanism that limits access to computer systems and network resources is ________,
answer
logical access control
question
________ is used to describe a property that indicates that a specific subject needs access to a specific object. This is necessary to access the object in addition to possessing the proper clearance for the object's classification.
answer
Need-to-know
question
________ is an authentication credential that is generally longer and more complex than a password.
answer
Passphrase
question
What name is given to an access control method that bases access control approvals on the jobs the user is assigned?
answer
role-based access control (RBAC)
question
An organization's facilities manager is often responsible for ____________.
answer
physical access control
question
An organization's facilities manager might give you a security card programmed with your employee ID number, also known as a ________.
answer
smart card
question
Biometrics is another ________ method for identifying subjects.
answer
access control
question
Which of the following is not a type of authentication?
answer
identification
question
Two-factor __________ should be the minimum requirement for valuable resources as it provides a higher level of security than using only one.
answer
authentication
question
Which of these biometric authentication methods is not as accurate as the rest?
answer
voice pattern
question
_____________is the process of dividing a task into a series of unique activities performed by different people, each of whom is allowed to execute only one part of the overall task.
answer
Separation of duties
question
Access control is the process of proving you are the person or entity you claim to be.
answer
False
question
________ is the process of managing changes to computer/device configuration or application software.
answer
Change control
question
________ states that users must never leave sensitive information in plain view on an unattended desk or workstation.
answer
Clean desk/clear screen policy
question
The name given to a group that is responsible for protecting sensitive data in the event of a natural disaster or equipment failure, among other potential emergencies, is ________.
answer
emergency operations group
question
The primary task of an organization's __________ team is to control access to systems or resources.
answer
security administration
question
Your organization's __________ sets the tone for how you approach related activities.
answer
security policy
question
When an information security breach occurs in your organization, a __________ helps determine what happened to the system and when.
answer
security event log
question
For all the technical solutions you can devise to secure your systems, the __________remains your greatest challenge.
answer
human element
question
Because personnel are so important to solid security, one of the best security controls you can develop is a strong security ___________ and awareness program.
answer
training
question
security awareness program includes ________.
answer
informing users about trends and threats in society
question
One of the most popular types of attacks on computer systems involves ___________. These attacks deceive or use people to get around security controls. The best way to avoid this risk is to ensure that employees know how to handle such attacks
answer
the World Wide Web
question
From the perspective of a _________ professional, configuration management evaluates the impact a modification might have on security.
answer
administration
question
_________ ensures that any changes to a production system are tested, documented, and approved.
answer
Change control
question
Enacting changes in response to reported problems is called ________.
answer
reactive change management
question
What is meant by standard?
answer
A mandated requirement for a hardware or software solution that is used to deal with a security risk throughout the organization.
question
An organization must comply with rules on two levels: regulatory compliance and organizational compliance.
answer
True
question
The term guideline refers to a group that oversees all proposed changes to systems and networks.
answer
False