CIS 333 Midterm ExamCIS 333 Midterm Exam
CIS 333 Midterm Exam Question 1 You log onto a network and are asked to present a combination of elements, such as user name, password, token, smart card, or biometrics. This is an example of which of the following? Answer Correct Answer: Logical access controls Question 2 An attacker enters more characters than expected into an input field, causing a buffer overflow and allowing malicious code to spread throughout the application. How has company access control been compromised? Answer Correct Answer: Exploiting applications Question 3 Identify two phases of the access control process. Answer Correct Answer: Identification and authorization Question 4 Which of the following access control models is based on a mathematical theory published in 1989 to ensure fair competition? Answer Correct Answer: Brewer and Nash Integrity Model
Written for
- Institution
-
Strayer University
- Course
-
CIS 333
Document information
- Uploaded on
- January 8, 2022
- Number of pages
- 5
- Written in
- 2021/2022
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- cis 333 midterm exam
-
which of the following access control models is based on a mathematical theory published in 1989 to ensure fair competition
-
you log onto a network and are asked to present a comb