1. Which of the following terms best describes access controls that are security features that govern how users and processes interact? Show A. Objects 2. Which of the following terms best describes the process of verifying the identity of a subject? A. Accountability B. Authorization C. Access model D. Authentication 3. Which of the following terms best describes the process of assigning authenticated subjects permission to carry out a specific operation? A. Accountability B. Authorization C. Access model D. Authentication 4. Which of the following terms best describes the active entity that requests access to an object or data? A. Subject B. Object C. Resource D. Factor 5. Which of the following security principles is best described as giving users the minimum access required to do their jobs? A. Least access B. Less protocol C. Least privilege D. Least process 6. Which of the following security principles is best described as prohibiting access to information not required for one's work? A. Access need security principle 7. Which type of access is allowed by the security principle of default deny? A. Basic access is allowed. B. Access that is not explicitly forbidden is permitted. C. Access that is not explicitly permitted is forbidden. D. None of the above. 8. Which of the following statements best describes security posture? about an object, such as a host (end system) or network B. An organization's approach to access controls based on information about a network switch or router C. An organization's approach to access controls based on information about a router D. An organization's approach to access controls based on information about a firewall 9. Who is responsible for defining discretionary access controls (DACs)? A. Data owners B. Data administrators C. Data custodians 10. Which of the following terms best describes the control that is used when the SOP for user provisioning requires the actions of two systems administrators—one who can create and delete accounts and the other who assigns access permissions? A. Least privilege C. Need-to-know 11. Which of the following types of network, operating system, or application access controls is user-agnostic and relies on specific criteria, such as source IP address, time of day, and geographic location? A. Mandatory B. Role-based C. Rule-based D. Discretionary 12. Which of the following is not considered an authentication factor? A. Knowledge B. Inheritance C. Possession D. Biometric 13. Which of the following terms best describes authentication that requires two or more factors? A. Dual control B. Multifactor C. Multilabel D. Multilayer 14. Which of the following statements provides examples of good password management? A. Passwords should be changed to increase the complexity and the length of the password. B. Passwords should be changed when there is a suspicion that the password has been compromised. C. Passwords should be changed to create a unique password after a user initially logs on to a system using a default or basic password. D. All of the above. 15. Which of the following terms best describes a type of password that is a form of knowledge-based authentication that requires users to answer a question based on something familiar to them? A. Categorical B. Cognitive C. Complex D. Credential 16. Which of the following types of authentication requires two distinct and separate channels to authenticate? A. In-band authentication D. Out-of-wallet authentication 17. Which of the following terms best describes the internal network that is accessible to authorized users? A. Trusted network 18. Rules related to source and destination IP address, port, and protocol are used by a(n) _____ to determine access. 15. Which of the following terms best describes Angle d?(remember that it's outsidea)Remote interior angle b)Corresponding angle CExterior angle d)Interior angle 1. Arrange the anales of the trianale in increaeina erd What does describes the measure of angle 2 and angle 4?∠2 and ∠4 are vertical angles. Their measures are equal, so m∠4 = 90 . When two lines intersect to form one right angle, they form four right angles. Two lines that intersect at a right angle are called perpendicular lines.
Which of the following best describe a corresponding angle?Corresponding angles in geometry are defined as the angles which are formed at corresponding corners with the transversal. When the two parallel lines are intersected by the transversal it forms the pair of corresponding angles.
Which of the following best describe the measure of an exterior angle of a triangle?The measure of an exterior angle of a triangle is equal to the sum of the measures of the two non-adjacent interior angles of the triangle. Definition of linear pair.
|