Chapter 7 Quiz - Started on Tuesday, 14 June 2011, 02:04 PM...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Started on Tuesday, 14 June 2011, 02:04 PM Completed on Tuesday, 14 June 2011, 02:54 PM Time taken 50 mins 1 sec Grade 97 out of a maximum of 100 ( 97 %)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Question 1 Marks: 2 In the ____ model, the end user cannot implement, modify, or transfer any controls. Choose one answer. a. Discretionary Access Control (DAC) b. Role Based Access Control (RBAC) c. Rule Based Access Control (RBAC) d. Mandatory Access Control (MAC) Correct Marks for this submission: 2/2. Question 2 Marks: 3 The ____ model is considered a more “real world” approach than the other models to structuring access control. Choose one answer. a. Discretionary Access Control (DAC) b. Rule Based Access Control (RBAC) c. Mandatory Access Control (MAC) d. Role Based Access Control (RBAC) Correct Marks for this submission: 3/3. Question 3 Marks: 3 Rule Based Access Control is often used for managing user access to one or more systems. Choose one answer. a. True b. False Correct Marks for this submission: 3/3.
Background image of page 2
Question 4 Marks: 3 Known as a ____ lock, this lock extends a solid metal bar into the door frame for extra security. Choose one answer. a. tailgate b. preset c. deadbolt d. cipher Correct Marks for this submission: 3/3. Question 5 Marks: 3 Regarding access control, an example of a(n) ____ is when a user attempts to delete a file. Choose one answer. a. object b. subject c. operation d. asset Correct Marks for this submission: 3/3. Question 6 Marks: 3 ____ locks are combination locks that use buttons that must be pushed in the proper sequence to open the door. Choose one answer. a. Cipher b. Deadbolt c. Preset
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
d. Tailgate Correct Marks for this submission: 3/3. Question 7 Marks: 3 Computer access control can be accomplished by one of three entities: hardware, software, or a policy. Choose one answer. a. True b. False Correct Marks for this submission: 3/3. Question 8 Marks: 3 ____ accounts are user accounts that remain active after an employee has left an organization. Choose one answer.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 07/10/2011 for the course SEC 100 taught by Professor Tuner during the Spring '11 term at Solano Community College.

Page1 / 12

Chapter 7 Quiz - Started on Tuesday, 14 June 2011, 02:04 PM...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online