100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ISOL 531 ACCESS CONTROL MIDTERM COMBINED EXAM FALL SEMESTER 2024.

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
03-02-2024
Written in
2023/2024

UNIVERSITY OF THE CUMBERLANDS ISOL 531 ACCESS CONTROL MIDTERM COMBINED EXAM FALL SEMESTER 2024. 100% VERIFIED QUESTIONS AND ANSWERS EXAM A+ GRADE. • Question 1 Authorization is a set of rights defined for a subject and an object. They are based on the subject’s identity. Selected Answer: Tru e Answers: Tru e False • Question 2 2 out of 2 points Fundamentally, refers to the ability of a subject and an object to interact. Selected Answer: access Answers: authorizat ion access biometrics identificati on • Question 3 0 out of 2 points Identification builds on authentication by requiring that the subject provide proof of its identity. Selected Answer: Tru e Answers: True Fals e • Question 4 0 out of 2 points Which of the following is not a factor of authentication? Selected Answer: What you Answers: know? Where you are? What you know? What you have? Who you are? • Question 5 2 out of 2 points The subject in an access control scenario is a person or another application requesting access to a resource such as the network, a file system, or a printer. Selected Answer: Tru e Answers: Tru e False • Question 6 0 out of 2 points What name is given to the process or mechanism of granting or denying use of a resource typically applied to users or generic network traffic? Selected Answer: authentication Answers: access control authentication biometrics identification password • Question 7 Which of the following is the definition of authentication factor? Selected Answer: A way of confirming the identity of a subject. The three 2 out of 2 points authentication factors are something you know, something you have, and something you are. Answers: A secret combination of characters known only to the subject. A way of confirming the identity of a subject. The three authentication factors are something you know, something you have, and something you are. The user, network, system, process, or application requesting access to a resource. Something only the subject and the authentication system know. • Question 8 2 out of 2 points A good risk assessment takes into account both the value of the assets to be protected and their impact on the overall organization. Selected Answer: Tru e Answers: Tru e False • Question 9 0 out of 2 points A phishing attack targeted at specific, usually high-level, individuals within an organization is the definition of spear phishing. Selected Answer: Fals e Answers: Tru e False • Question 10 0 out of 2 points A scenario with a high probability but low impact is a lower priority risk than one with a high probability and high impact. Selected Answer: Fals e Answers: Tru e False • Question 11 2 out of 2 points Annualized loss expectancy (ALE) means the total cost per year of the threat under assessment. ALE is calculated by multiplying the SLE by the ARO. Selected Answer: Tru e Answers: Tru e False • Question 12 2 out of 2 points In order to correctly prioritize efforts at mitigating threats and vulnerabilities, we perform to accurately decide which threats represent the biggest impact to resources and data. Selected Answer: risk assessment Answers: vulnerability analysis risk assessment single loss expectancy probability of occurrence • Question 13 2 out of 2 points In the risk management strategy known as risk , you offload the risk to a third party. Selected Answer: transfere nce Answers: transfere nce mitigatio n avoidanc e acceptan ce • Question 14 2 out of 2 points In the risk management strategy known as risk ,you implement controls designed to lessen the probability and/or impact of a risk. Selected Answer: mitigatio n Answers: transfere nce mitigatio n avoidanc e acceptan ce • Question 15 2 out of 2 points The number of times per year you expect a compromise to occur is the definition of . Selected Answer: annualized rate of occurrence (ARO) Answers: annualized rate of occurrence (ARO) exposure factor (EF) defense-in-depth strategy qualitative risk assessment • Question 16 2 out of 2 points What term is used to describe a technical, physical, or administrative process designed to reduce risk? Selected Answer: control Answers: defense-in-depth strategy qualitative risk assessment infrastructure control • Question 17 is the relative value, either in monetary terms or in overall impact, of the resource being protected by the access control system. Selected Answer: Asset value (AV) Answers: Cost of replacement Probability of occurrence Asset value (AV) Exposure factor (EF) 2 out of 2 points • Question 18 2 out of 2 points According to the national security classification, information, if disclosed, could reasonably be expected to cause damage to national security. Selected Answer: confident ial Answers: secret confident ial unclassifi ed top secret • Question 19 2 out of 2 points According to the typical corporate security classification scheme, information, if disclosed, could cause serious damage to the firm. Selected Answer: sensitive Answers: sensitive public internal highly sensitive • Question 20 2 out of 2 points Only a person with the approved level of access is allowed to view the information. This access is called . Selected Answer: clearance Answers: clearance classificati on disclosure policy • Question 21 2 out of 2 points The process used to move a classified document into the public domain is the definition of declassification. Selected Answer: Tru e Answers: Tru e False • Question 22 2 out of 2 points The requester of sensitive information should not receive access just because of his or her clearance, position, or rank. The requester must also establish a valid need to see the information. The term for this is . Selected Answer: need to know Answers: least privilege need to know confidential information declassification access control • Question 23 What term is used to describe a method of organizing sensitive 2 out of 2 points information into various access levels? Selected Answer: classification scheme Answers: confidential

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
February 3, 2024
Number of pages
16
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Nurslink Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
220
Member since
2 year
Number of followers
72
Documents
1672
Last sold
1 week ago
Nurslink.

Pre-eminent study guidance.

3.4

23 reviews

5
8
4
6
3
3
2
0
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions