Security Technology: Wireless, VPNs, and Firewalls

SwiftMarsh avatar
SwiftMarsh
·
·
Download

Start Quiz

Study Flashcards

15 Questions

What is the technology enabling the use of virtual private networks?

Content filtering

Which method uses data classification schemes for access control?

Mandatory access controls (MACs)

What is the mechanism whereby an unverified entity proposes a label for access to a resource?

Identification

What type of access control is a strictly-enforced version of MACs managed by a central authority?

Nondiscretionary controls

What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?

Technical controls

What type of controls are essential in enforcing policy for many IT functions that do not involve direct human control?

Technical controls

What type of access control is implemented at the discretion or option of the data user?

Discretionary access controls (DACs)

What is the mechanism by which an unverified entity seeking access to a resource proposes a label by which they are known to the system?

Identification

What type of access control uses data classification schemes?

Mandatory access controls (MACs)

What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?

Technical control solutions

What type of access control is a strictly-enforced version of MACs that are managed by a central authority?

Nondiscretionary controls

What is the mechanism by which an unverified entity seeking access to a resource proposes a label by which they are known to the system?

Identification

Which technology enables the use of virtual private networks?

Content filtering technology

What type of controls are essential in enforcing policy for many IT functions that do not involve direct human control?

Technical controls

What improves an organization’s ability to balance making information readily available against increasing information’s levels of confidentiality and integrity?

Technical control solutions

Test your knowledge of security technology with a focus on wireless, VPNs, and firewalls. Learn about the important role of access control in computerized information systems and understand the limitations of technology in solving security problems.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser