CMGT 430 Wk 1 - Management of Information Security, Ch. 8 Quiz | eBooks | Education

CMGT 430 Wk 1 - Management of Information Security, Ch. 8 Quiz

CMGT 430 Wk 1 - Management of Information Security, Ch. 8 Quiz PLDZ-12669
In Stock
$ 3.00 USD
Buy and Download   > Description

***************************************************************

Click Here To Download Your Files : 

https://uopcourses.com/category/cmgt-430/

   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

You can buy more tutorials from the below link.

https://uopcourse.com/

***************************************************************

CMGT 430 Wk 1 - Management of Information Security, Ch. 8 Quiz

Complete the Ch. 8 Quiz using the MindTap Access link.

Which access control principle limits a user's access to the specific information required to perform the currently assigned task?

  • Separation of duties
  • Eyes only
  • Least privilege
  • Need-to-know

 

A time-release safe is an example of which type of access control?

  • Nondiscretionary
  • Temporal isolation
  • Content-dependent
  • Constrained user interface

 

In which form of access control is access to a specific set of information contingent on its subject matter?

  • Temporal isolation
  • Content-dependent access controls
  • None of these
  • Constrained user interfaces

 

Which type of access controls can be role-based or task-based?

  • Nondiscretionary
  • Constrained
  • Content-dependent
  • Discretionary

 

Which of the following specifies the authorization classification of information asset an individual user is permitted to access, subject to the need-to-know principle?

  • Task-based access controls
  • Security clearances
  • Discretionary access controls
  • Sensitivity levels

 

Under lattice-based access controls, the column of attributes associated with a particular object (such as a printer) is referred to as which of the following?

  • Access control list
  • Capabilities table
  • Access matrix
  • Sensitivity level

 

Controls that remedy a circumstance or mitigate damage done during an incident are categorized as which of the following?

  • Deterrent
  • Preventative
  • Corrective
  • Compensating

 

Which security architecture model is based on the premise that higher levels of integrity are more worthy of trust than lower ones?

  • Bell-LaPadula
  • Clark-Wilson
  • Common Criteria
  • Biba

 

Which control category discourages an incipient incident?

  • Compensating
  • Preventative
  • Remitting
  • Deterrent

 

Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary?

  • Need-to-know
  • Separation of duties
  • Least privilege
  • Eyes only
*************************************************************** Click Here To Download Your Files : https://uopcourses.com/category/cmgt-430/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ You can buy more tutorials from the below link. h
Recent Reviews Write a Review
0 0 0 0 reviews