Lesson 1 - Security Fundamentals Assignments

Lesson 1 - Security Fundamentals Assignments - Stephen L...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Stephen L Coates Jr (SteCoa8799) Monday, October 11, 2010 CIS 212 Network Security Concepts Lesson 1 – Security Fundamentals Assignment Activity 1-1 Discussing Security Building Blocks 1) Three common goals of computer security are: A)Confidentiality, C) Integrity, E) Availability 2) A biometric scanner is used as part of a system for granting access to a facility once identity is verified, the system checks and confirms that the user is allowed to leave the lobby and enter the facility and the electronic door lock is released. This is an example of which one or more of the Four A’s? A)Authentication, B) Authorization, C) Auditing 3) Katie’s handprint is matched against a record in the system that indicates that she has been assigned clearance to view the contents of secret documents. Later at her deskt, she tries to connect to a folder that is marked Top Secret, and her access is denied. This is an example of: C) Role-Based Access control 4) At the end of the day, Security personnel can view electronic log files that record the identites of everyone who entered and exited the building along with the time of the day. This is an example of: D) Auditing 5) An administrator of a large multinational company has the ability to assign object access rights and track users’ resource access from a central administrative console. Users throughout the organization can gain access to any system after providing a single user name and password. This is an example of: C) privilege management 6) Match the access control principle to its definition. Implicit Deny –
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

Lesson 1 - Security Fundamentals Assignments - Stephen L...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online