Which of the following terms best describes d

1. Which of the following terms best describes access controls that are security features that govern how users and processes interact?

A. Objects
B. Resources
C. Processes
D. All of the above

2. Which of the following terms best describes the process of verifying the identity of a subject?

A. Accountability 

B. Authorization 

C. Access model

D. Authentication

3. Which of the following terms best describes the process of assigning authenticated subjects permission to carry out a specific operation?

A. Accountability 

B. Authorization 

C. Access model 

D. Authentication

4. Which of the following terms best describes the active entity that requests access to an object or data?

A. Subject 

B. Object 

C. Resource 

D. Factor

5. Which of the following security principles is best described as giving users the minimum access required to do their jobs?

A. Least access 

B. Less protocol 

C. Least privilege 

D. Least process

6. Which of the following security principles is best described as prohibiting access to information not required for one's work?

A. Access need security principle
B. Need-to-monitor security principle
C. Need-to-know security principle
D. Required information process security principle

7. Which type of access is allowed by the security principle of default deny? 

A. Basic access is allowed.

B. Access that is not explicitly forbidden is permitted. 

C. Access that is not explicitly permitted is forbidden. 

D. None of the above.

8. Which of the following statements best describes security posture?
A. An organization's approach to access controls based on information

about an object, such as a host (end system) or network

B. An organization's approach to access controls based on information about a network switch or router

C. An organization's approach to access controls based on information about a router

D. An organization's approach to access controls based on information about a firewall

9. Who is responsible for defining discretionary access controls (DACs)? 

A. Data owners

B. Data administrators 

C. Data custodians
D. Data users

10. Which of the following terms best describes the control that is used when the SOP for user provisioning requires the actions of two systems administrators—one who can create and delete accounts and the other who assigns access permissions?

A. Least privilege
B. Segregation of duties 

C. Need-to-know
D. Default deny

11. Which of the following types of network, operating system, or application access controls is user-agnostic and relies on specific criteria, such as source IP address, time of day, and geographic location?

A. Mandatory

B. Role-based 

C. Rule-based 

D. Discretionary

12. Which of the following is not considered an authentication factor? 

A. Knowledge

B. Inheritance 

C. Possession 

D. Biometric

13. Which of the following terms best describes authentication that requires two or more factors?

A. Dual control 

B. Multifactor 

C. Multilabel 

D. Multilayer

14. Which of the following statements provides examples of good password management?

A. Passwords should be changed to increase the complexity and the length of the password.

B. Passwords should be changed when there is a suspicion that the password has been compromised.

C. Passwords should be changed to create a unique password after a user initially logs on to a system using a default or basic password.

D. All of the above.

15. Which of the following terms best describes a type of password that is a form of knowledge-based authentication that requires users to answer a question based on something familiar to them?

A. Categorical 

B. Cognitive

C. Complex 

D. Credential

16. Which of the following types of authentication requires two distinct and separate channels to authenticate?

A. In-band authentication
B. Mobile authentication
C. Out-of-band authentication 

D. Out-of-wallet authentication

17. Which of the following terms best describes the internal network that is accessible to authorized users?

A. Trusted network
B. DMZ
C. The Internet
D. Semi-trusted network

18. Rules related to source and destination IP address, port, and protocol are used by a(n) _____ to determine access.

15. Which of the following terms best describes Angle d?(remember that it's outside
a)Remote interior angle
b)Corresponding angle
CExterior angle
d)Interior angle 1. Arrange the anales of the trianale in increaeina erd

What does describes the measure of angle 2 and angle 4?

∠2 and ∠4 are vertical angles. Their measures are equal, so m∠4 = 90 . When two lines intersect to form one right angle, they form four right angles. Two lines that intersect at a right angle are called perpendicular lines.

Which of the following best describe a corresponding angle?

Corresponding angles in geometry are defined as the angles which are formed at corresponding corners with the transversal. When the two parallel lines are intersected by the transversal it forms the pair of corresponding angles.

Which of the following best describe the measure of an exterior angle of a triangle?

The measure of an exterior angle of a triangle is equal to the sum of the measures of the two non-adjacent interior angles of the triangle. Definition of linear pair.