• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
An access control system that grants access to information based upon its classification and the clearance of the individual is know as?
Mandatory Access Control - based upon the uses clearance level, the classification of the information, and the users need to know.
An Access control system that grants access based upon the identity of the user is known as?
Identy Based Access control - used to grant access to information based upon the identity of the person requesting the access.
An access control system that grants access to information based upon its classification and the clearance of the individual is know as?
Mandatory Access Control - based upon the uses clearance level, the classification of the information, and the users need to know.
An Access control system that grants access based upon the identity of the user is known as?
Identy Based Access control - used to grant access to information based upon the identity of the person requesting the access.
In reference to Biometric systems what is the Throughput Rate?
The number of end users that a biometric system can process within a stated time interval.
Define a Vulnerability?
A software or hardware or procedural weakness that may provide an attacker the open door he is looking for to enter a computewr or network and have authorized access to resources within the environment.
Define a Threat?
Any potential danger to nformation or systems
Waht is a threat Agent?
The entity that takes advantage of a vulnerability.
What is Risk?
A risk is the likihood of a threat agent taking advantage of a vulnerability and the corresponding business impact.
What is an exposure?
An instance of being exposed to losses from a threat agent.
What is a safegaurd or a countermeasure?
Something put in place to nitigate risk.