82%(17)14 out of 17 people found this document helpful
This preview shows page 10 - 12 out of 13 pages.
Craig likes to work on his computer at his local coffee shop, but people around him may be able to seewhat he is doing, including entering passwords for his accounts. This method of gaining confidentialinformation is referred to as ________.phishingshoulder surfingman-in-the-middle attacksspear phishing2.00000 points Save AnswerQUESTION 75What term is used to describe shifting responsibility for a risk to a third party?2.00000 points Save AnswerQUESTION 76This is a network security protocol that provides authentication and authorization services on anetwork.2.00000 points Save AnswerSave AnswerQUESTION 77What is meant by failure to enroll rate?2.00000 points Save AnswerSave AnswerSave All AnswSave All AnswClick Save and Submit to save and submit. Click Save All Answers to save all answers.
4/26/2018Take Test: Final Exam – 2018_SPR_MAIN_Access Control_22QUESTION 78There are two types of access control lists (ACLs): discretionary and ___________.activesystemmandatorysystem2.00000 points Save AnswerSave AnswerQUESTION 79Which of the following is the definition of false positive?2.00000 points Save AnswerQUESTION 80What is meant by mandatory access control( MAC)?