Information Security: CIA Triad and Access Control

SensitiveEcstasy avatar
SensitiveEcstasy
·
·
Download

Start Quiz

Study Flashcards

10 Questions

What should be avoided when transmitting passwords over a network?

Clear text

What is the purpose of password verification tools and password-cracking tools?

To test passwords for weaknesses

What is the recommended duration for idle user accounts before they are disabled?

A month

What is the recommended length for strong passwords?

16 characters or more

What is the purpose of biometric authentication?

To provide unique identification

What is an example of a synchronous dynamic password token?

Token that generates a password that changes at a fixed interval

What is the purpose of Kerberos logon process?

To authenticate users and issue tickets

What is the purpose of a TGT in Kerberos?

To issue tickets for resource access

What is the recommended practice for displaying passwords on screens and forms?

Do not display passwords in any form

What is the purpose of creating lists of passwords users should avoid?

To identify weak passwords

Test your knowledge on the CIA Triad principles of Confidentiality, Integrity, and Availability, as well as the different types of access control measures, including preventive, detective, and corrective controls. Learn how to implement access control in a layered environment.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser