Authentication Basics

PromisingDystopia avatar
PromisingDystopia
·
·
Download

Start Quiz

Study Flashcards

25 Questions

What is the primary goal of the Computer Security Division (CSD) at NIST?

To improve information systems security

Which of the following is a publication series produced by NIST?

Special Publication 800 series

How many divisions are within NIST's Information Technology Laboratory?

Eight

What is the name of the laboratory that the Computer Security Division (CSD) is a part of?

Information Technology Laboratory

What type of documents are ITL bulletins?

Informational briefs on security topics

What is a characteristic of human nature?

Being trusting

What is the primary focus of the Asset Management domain?

Developing classification schema

What is NOT a primary goal of the Asset Management domain?

Conducting penetration testing

What is the section number associated with the Asset Management domain?

Section 8

What is the purpose of assigning classification levels in the Asset Management domain?

To determine access levels

What is the primary focus of the Cryptography domain?

Protecting confidentiality, integrity, and availability of information

When was the Cryptography domain added?

2013

What is the primary concern of the Cryptography domain in terms of information?

Confidentiality, integrity, and availability

What is the primary objective of using cryptography according to the Cryptography domain?

To protect the confidentiality, integrity, and availability of information

Which of the following is related to the Cryptography domain?

Protecting information's CIA

Who is considered the information owner?

An official with legal or operational authority for specified information

Which role is responsible for the information ownership?

An official with legal or operational authority for specified information

What is the primary criterion for being an information owner?

Holding legal or operational authority for specified information

Can any employee in an organization be considered an information owner?

No, it must be an official with legal or operational authority for specified information

Which of the following individuals is least likely to be an information owner?

Front Desk Receptionist

What is the primary focus of identification in the context of secured information and systems?

Positively identifying the person or system seeking access

What is the primary goal of identification in secured systems?

To authenticate the identity of the person or system

In the context of secured information, what does identification primarily involve?

Verifying the identity of the person or system

What is the primary benefit of identification in secured systems?

To ensure that only authorized entities can access the secured information

What is the relationship between identification and access control in secured systems?

Identification is the first step in the access control process

Learn about the positive identification process required for accessing secured information or systems.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser