Podcast
Questions and Answers
Which type of control is strictly enforced and managed by a central authority?
Which type of control is strictly enforced and managed by a central authority?
- Nondiscretionary controls (correct)
- Discretionary access controls (DACs)
- Mandatory access controls (MACs)
- Access control
Which method allows users to control and provide access to information/resources at their disposal?
Which method allows users to control and provide access to information/resources at their disposal?
- Access control
- Discretionary access controls (DACs) (correct)
- Nondiscretionary controls
- Mandatory access controls (MACs)
Which mechanism allows unverified entities seeking access to a resource to provide a label by which they are known to the system?
Which mechanism allows unverified entities seeking access to a resource to provide a label by which they are known to the system?
- Technical controls
- Access control
- Identification (correct)
- Authentication
What is the process of validating a supplicant's purported identity called?
What is the process of validating a supplicant's purported identity called?
What are examples of authentication factors?
What are examples of authentication factors?
Which type of control is used to determine whether and how to admit a user into a trusted area of the organization?
Which type of control is used to determine whether and how to admit a user into a trusted area of the organization?
What is the purpose of mandatory access controls (MACs)?
What is the purpose of mandatory access controls (MACs)?
What is the main difference between discretionary access controls (DACs) and nondiscretionary controls?
What is the main difference between discretionary access controls (DACs) and nondiscretionary controls?
What is the mechanism called where unverified entities seeking access to a resource provide a label by which they are known to the system?
What is the mechanism called where unverified entities seeking access to a resource provide a label by which they are known to the system?
Which of the following is an example of an authentication factor?
Which of the following is an example of an authentication factor?