Security Technology: Wireless, VPNs, and Firewalls
15 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the technology enabling the use of virtual private networks?

  • Identification
  • Access control
  • Technical controls
  • Content filtering (correct)
  • Which method uses data classification schemes for access control?

  • Mandatory access controls (MACs) (correct)
  • Technical controls
  • Discretionary access controls (DACs)
  • Nondiscretionary controls
  • What is the mechanism whereby an unverified entity proposes a label for access to a resource?

  • Access control
  • Content filtering
  • Identification (correct)
  • Technical controls
  • What type of access control is a strictly-enforced version of MACs managed by a central authority?

    <p>Nondiscretionary controls</p> Signup and view all the answers

    What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?

    <p>Technical controls</p> Signup and view all the answers

    What type of controls are essential in enforcing policy for many IT functions that do not involve direct human control?

    <p>Technical controls</p> Signup and view all the answers

    What type of access control is implemented at the discretion or option of the data user?

    <p>Discretionary access controls (DACs)</p> Signup and view all the answers

    What is the mechanism by which an unverified entity seeking access to a resource proposes a label by which they are known to the system?

    <p>Identification</p> Signup and view all the answers

    What type of access control uses data classification schemes?

    <p>Mandatory access controls (MACs)</p> Signup and view all the answers

    What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?

    <p>Technical control solutions</p> Signup and view all the answers

    What type of access control is a strictly-enforced version of MACs that are managed by a central authority?

    <p>Nondiscretionary controls</p> Signup and view all the answers

    What is the mechanism by which an unverified entity seeking access to a resource proposes a label by which they are known to the system?

    <p>Identification</p> Signup and view all the answers

    Which technology enables the use of virtual private networks?

    <p>Content filtering technology</p> Signup and view all the answers

    What type of controls are essential in enforcing policy for many IT functions that do not involve direct human control?

    <p>Technical controls</p> Signup and view all the answers

    What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?

    <p>Technical control solutions</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser