Day 3: Access controls
Authorized users exceeding their authority
Persons who have defeated the physical access controls of a facility
Employees gaining access to controlled areas
Users who access unintended areas of the network
Rate this question:
Dictionary attack
Brute-force attack
Birthday attack
Shoulder-surfing attack
Rate this question:
Its primary effect is to consume system resources.
It may or may not carry a malicious payload.
It spreads through user action.
It attaches itself to executable code.
Rate this question:
A physical control
A logical control
A compensating control
An administrative control
Rate this question:
Authentication
Identification
Authorization
Accountability
Rate this question:
User acceptance
Accuracy
Productivity
Processing speed
Rate this question:
Reduced total cost of ownership of desktops
Standardized access control
Easier training for users
Wider availability of applications
Rate this question:
Successful access attempts
System performance measurements
Failed access attempts
Changes to user permissions
Rate this question:
Modification may impede an investigation
An attacker may try to alter them.
They may contain confidential information.
Standard format is critical for automated processing.
Rate this question:
Setting a higher clipping level
Locking out a user for a set time period
Establishing a lockout that requires administrator intervention
Using a stronger cryptographic algorithm
Rate this question:
Etching
Microprobing
Fault generation
Eavesdropping
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.