Craig likes to work on his computer at his local coffee shop, but people around him may be able to seewhat he is doing, including entering passwords for his accounts. This method of gaining confidentialinformation is referred to as ________.
phishingshoulder surfingman-in-the-middle attacksspear phishing
2.00000 points
Save Answer
QUESTION 75
What term is used to describe shifting responsibility for a risk to a third party?
2.00000 points
Save Answer
QUESTION 76
This is a network security protocol that provides authentication and authorization services on anetwork.
2.00000 points
Save Answer
Save Answer
QUESTION 77
What is meant by failure to enroll rate
?
2.00000 points
Save Answer
Save Answer
Save All Answ
Save All Answ
Click Save and Submit to save and submit. Click Save All Answers to save all answers.

4/26/2018
Take Test: Final Exam – 2018_SPR_MAIN_Access Control_22
QUESTION 78
There are two types of access control lists (ACLs): discretionary and ___________.
activesystemmandatorysystem
2.00000 points
Save Answer
Save Answer
QUESTION 79
Which of the following is the definition of false positive
?
2.00000 points
Save Answer
QUESTION 80
What is meant by mandatory access control( MAC
)?

