Craig likes to work on his computer at his local coffee shop but people around

Craig likes to work on his computer at his local

This preview shows page 10 - 12 out of 13 pages.

Craig likes to work on his computer at his local coffee shop, but people around him may be able to seewhat he is doing, including entering passwords for his accounts. This method of gaining confidentialinformation is referred to as ________. phishingshoulder surfingman-in-the-middle attacksspear phishing 2.00000 points Save Answer QUESTION 75 What term is used to describe shifting responsibility for a risk to a third party? 2.00000 points Save Answer QUESTION 76 This is a network security protocol that provides authentication and authorization services on anetwork. 2.00000 points Save Answer Save Answer QUESTION 77 What is meant by failure to enroll rate ? 2.00000 points Save Answer Save Answer Save All Answ Save All Answ Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Image of page 10
4/26/2018 Take Test: Final Exam – 2018_SPR_MAIN_Access Control_22 QUESTION 78 There are two types of access control lists (ACLs): discretionary and ___________. activesystemmandatorysystem 2.00000 points Save Answer Save Answer QUESTION 79 Which of the following is the definition of false positive ? 2.00000 points Save Answer QUESTION 80 What is meant by mandatory access control( MAC )?
Image of page 11
Image of page 12

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture