Security Technology: Wireless, VPNs, and Firewalls
15 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the technology enabling the use of virtual private networks?

  • Identification
  • Access control
  • Technical controls
  • Content filtering (correct)
  • Which method uses data classification schemes for access control?

  • Mandatory access controls (MACs) (correct)
  • Technical controls
  • Discretionary access controls (DACs)
  • Nondiscretionary controls
  • What is the mechanism whereby an unverified entity proposes a label for access to a resource?

  • Access control
  • Content filtering
  • Identification (correct)
  • Technical controls
  • What type of access control is a strictly-enforced version of MACs managed by a central authority?

    <p>Nondiscretionary controls</p> Signup and view all the answers

    What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?

    <p>Technical controls</p> Signup and view all the answers

    What type of controls are essential in enforcing policy for many IT functions that do not involve direct human control?

    <p>Technical controls</p> Signup and view all the answers

    What type of access control is implemented at the discretion or option of the data user?

    <p>Discretionary access controls (DACs)</p> Signup and view all the answers

    What is the mechanism by which an unverified entity seeking access to a resource proposes a label by which they are known to the system?

    <p>Identification</p> Signup and view all the answers

    What type of access control uses data classification schemes?

    <p>Mandatory access controls (MACs)</p> Signup and view all the answers

    What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?

    <p>Technical control solutions</p> Signup and view all the answers

    What type of access control is a strictly-enforced version of MACs that are managed by a central authority?

    <p>Nondiscretionary controls</p> Signup and view all the answers

    What is the mechanism by which an unverified entity seeking access to a resource proposes a label by which they are known to the system?

    <p>Identification</p> Signup and view all the answers

    Which technology enables the use of virtual private networks?

    <p>Content filtering technology</p> Signup and view all the answers

    What type of controls are essential in enforcing policy for many IT functions that do not involve direct human control?

    <p>Technical controls</p> Signup and view all the answers

    What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?

    <p>Technical control solutions</p> Signup and view all the answers

    More Like This

    Authorization and Access Control Quiz
    15 questions
    Access Control Methods
    28 questions

    Access Control Methods

    RoomierDivisionism avatar
    RoomierDivisionism
    Use Quizgecko on...
    Browser
    Browser