Filters
Question type

Study Flashcards

__________ is verification that the credentials of a user or other system entity are valid.


A) Adequacy
B) Authentication
C) Authorization
D) Audit

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A user may belong to multiple groups.

A) True
B) False

Correct Answer

verifed

verified

A __________ is a mapping between a user and an activated subset of the set of roles to which the user is assigned.

Correct Answer

verifed

verified

A concept that evolved out of requirements for military information security is ______ .


A) reliable input
B) mandatory access control
C) open and closed policies
D) discretionary input

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

__________ is based on the roles the users assume in a system rather than the user's identity.


A) DAC
B) RBAC
C) MAC
D) URAC

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Showing 41 - 45 of 45

Related Exams

Show Answer