16.
Access control is best described as which of the following?
- A.Reduction a social networking
- B.The elimination of risk when allowing users on a network
- C.The use of identification and authorization techniques
- D.The use of federated identities
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The use of identifi cation and authorization techniques best describes access control. Options A, B, and D are distractors. |
17.
What is the type of access control in the default access control method found in Microsoft
Windows which allows users to share files?
- A.Mandatory access control
- B.Rule-based access control
- C.Sensitivity-based access control
- D.Discretionary access control
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Options A, B, and C are access controls, but they do not allow users to share fi les at their discretion. |
18.
Which of the following types of access control is preferred for its ease of administration
when there are a large number of personnel with the same job in an organization?
- A.Mandatory Access Control
- B.Role-based Access Control
- C.Rule-Based Access Control
- D.Label-based Access Control
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Role-based access control (RBAC) permits authorization to be assigned according to an individual’s role or title in the organization. Options A, C, and D are distractors. |
19.
Which of the following best describes the time that it takes to register with a biometric
system, by providing samples of a personal characteristic?
- A.Setup time
- B.Login time
- C.Enrollment time
- D.Throughput time
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Options A, B, and D are distractors. |
20.
Which technique best describes a one-to-one search to verify an individual’s claim of
identity?
- A.Authentication
- B.Accounting review
- C.Authorization
- D.availability
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Authentication is the method of verifying an individual’s claim of identity. Options B, C, and D are distractors. |