• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Which of the following represents the columns of the table in a relational database?
attributes
Which access control model is best suited in an environment where a high security level is required and where it is desired that only the administrator grants access control?
MAC
A confidential number to verify a user's identity is called a:
PIN.
Which of the following would NOT be considered a Denial of Service Attack?
Zone Transfer
Which of the following biometrics devices has the highest Crossover Error Rate (CER)?
Voice pattern
What can be defined as a table of subjects and objects indicating what actions individual subjects can take upon individual objects?
An access control matrix
What is called the percentage of invalid subjects that are falsely accepted?

Access Control
False Acceptance Rate (FAR) or Type II Error
In biometric identification systems, at the beginning, it was soon apparent that truly positive identification could only be based on physical attributes of a person. This raised the necessicity of answering 2 questions

Access Control
what part of body to be used and how to accomplish identification to be viable
Which of the following could inappropriately capture network user passwords?

Access Control
Sniffing
What does the * (star) integrity axiom mean in the Biba model?

Access Control
No write up
Why would anomaly detection IDSs often generate a large number of false positives?

Access Control
Because normal patterns of user and system behavior can vary wildly.
Which of the following statements pertaining to Kerberos is false?

Access Control
Kerberos uses public key cryptography.
What does the Clark-Wilson security model focus on?

Access Control
Security Architecture and Design
Integrity
The primary service provided by Kerberos is which of the following?

Access Control
authentication
Which security model uses division of operations into different parts and requires different users to perform each part?

Access Control
Security Architecture and Design
Clark-Wilson model
What are cognitive passwords?

Access Control
Fact- or opinion-based information used to verify an individual's identity.
In biometric identification systems, false accept rate is associated with:

Access Control
Type 2 errors
What is the primary goal of setting up a honeypot?

Access Control
To know when certain types of attacks are in progress and to learn about attack techniques so the network can be fortified.
Which of the following would NOT be considered a Denial of Service Attack?
# Zone Transfer
# Smurf
# Syn Flood
# TearDrop
Zone Transfer
The throughput rate is the rate at which individuals, once enrolled, can be processed and identified or authenticated by a system. Acceptable throughput rates are in the range of:
10 subjects per minute.