Home
You may like this!
16.
Access control is best described as which of the following?
  • A.
    Reduction a social networking
  • B.
    The elimination of risk when allowing users on a network
  • C.
    The use of identification and authorization techniques
  • D.
    The use of federated identities
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The use of identifi cation and authorization techniques best describes access control. Options A, B, and D are distractors.
Report
Name Email  
17.
What is the type of access control in the default access control method found in Microsoft Windows which allows users to share files?
  • A.
    Mandatory access control
  • B.
    Rule-based access control
  • C.
    Sensitivity-based access control
  • D.
    Discretionary access control
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Options A, B, and C are access controls, but they do not allow users to share fi les at their discretion.
Report
Name Email  
18.
Which of the following types of access control is preferred for its ease of administration when there are a large number of personnel with the same job in an organization?
  • A.
    Mandatory Access Control
  • B.
    Role-based Access Control
  • C.
    Rule-Based Access Control
  • D.
    Label-based Access Control
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Role-based access control (RBAC) permits authorization to be assigned according to an individual’s role or title in the organization. Options A, C, and D are distractors.
Report
Name Email  
19.
Which of the following best describes the time that it takes to register with a biometric system, by providing samples of a personal characteristic?
  • A.
    Setup time
  • B.
    Login time
  • C.
    Enrollment time
  • D.
    Throughput time
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Options A, B, and D are distractors.
Report
Name Email  
20.
Which technique best describes a one-to-one search to verify an individual’s claim of identity?
  • A.
    Authentication
  • B.
    Accounting review
  • C.
    Authorization
  • D.
    availability
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Authentication is the method of verifying an individual’s claim of identity. Options B, C, and D are distractors.
Report
Name Email