1,278
23
Essay, 2 pages (300 words)

Access control and data security assures

Which property of data security assures that only authorized users can modify data? A. Availability b. Integrity c. Confidentiality d.

Non-repudiation 2. Which property of data would a successful denial-of-service (DOS) attack most affect? A. Availability c. Confidentiality 3.

Which of the following is a stand-alone malicious software program that actively transmits itself, generally over networks, to infect other computers? A. Virus b. Trojan horse c. Worm d. Backdoor 4.

Which description below best describes a physical control? A. A device that limits access or otherwise protects a resource, such as a fence, door, lock, or fire extinguisher. B. A control that repairs the effects of damage from an attack.

C. A device or process that limits access to a resource. Examples Include user authentication. Antivirus software.

And firewalls. D. A management action, written policy, procedure, guideline, regulation, law, or rule of any kind. 5. Which term means any exposure to a threat? A. Risk b.

Vulnerability c. Attack d. Intro 6. Which term means the collection of all possible vulnerabilities that could provide unauthorized access to computer resources? A.

Vulnerability universe b. Risk exposure c. Threat model d. Attack surface 7. Which of the following terms mean the act of granting and/or denying access to resources based on the authenticated user? A.

Identification b. Authentication c. Validation 8. Which of the following terms is an access control method based on the subject’s clearance and the object’s classification? A. Discretionary Access Control (DACCA) .

Mandatory Access Control (MAC) c. Role Based Access Control (ARAB) d. Line Driver Access Control (LDAP) 9. Which type of authentication is based on a physical object that contains identity information, such as a token, card, or other device? A.

Type IV b. Type Ill c. Type II d. Type I 10. Which of the following best describes the term vulnerability? A.

Any weakness that allows an attacker to successfully realize a threat. B. A potential violation of security. C. Any exposure to a threat. D.

Any action that could lead to damage or loss.

Thank's for Your Vote!
Access control and data security assures. Page 1
Access control and data security assures. Page 2
Access control and data security assures. Page 3

This work, titled "Access control and data security assures" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Access control and data security assures'. 9 October.

Reference

AssignBuster. (2022, October 9). Access control and data security assures. Retrieved from https://assignbuster.com/access-control-and-data-security-assures/

References

AssignBuster. 2022. "Access control and data security assures." October 9, 2022. https://assignbuster.com/access-control-and-data-security-assures/.

1. AssignBuster. "Access control and data security assures." October 9, 2022. https://assignbuster.com/access-control-and-data-security-assures/.


Bibliography


AssignBuster. "Access control and data security assures." October 9, 2022. https://assignbuster.com/access-control-and-data-security-assures/.

Work Cited

"Access control and data security assures." AssignBuster, 9 Oct. 2022, assignbuster.com/access-control-and-data-security-assures/.

Get in Touch

Please, let us know if you have any ideas on improving Access control and data security assures, or our service. We will be happy to hear what you think: [email protected]