Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Principles of Computer
Quiz 2: General Security Concepts
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Ensuring that users have access only to the files they need to complete their tasks is an example of which principle?
Question 2
Multiple Choice
Which of the following is not one of the three general methods used in authentication?
Question 3
Multiple Choice
A database server is put on the network by the for a project manager.No one is told it is there except for the project manager,so that he can work on it without worrying that other individuals will try to get to it.This is an example of which principle?
Question 4
Multiple Choice
Jane is in the finance department.Although she should not be able to modify files or folders from the marketing department,she can,and does.This a problem of ___________.
Question 5
Multiple Choice
The incident response team reviewed the security logs and discovered that the network had been breached,due to a misconfigured firewall.This is a failure of which element of the operational model of computer security?
Question 6
Multiple Choice
The network engineer suggests purchasing two firewalls from different companies so that a vulnerability affecting one type of firewall will not leave the entire network vulnerable.This is an example of which principle?
Question 7
Multiple Choice
A list of web sites that can be visited is created.Only sites that are on the list are allowed to be accessed.This is an example of which principle?
Question 8
Multiple Choice
Bob inadvertently disconnects the cable from the company file server.This creates a problem of ________.
Question 9
Multiple Choice
Requiring one employee to place an order and another employee to authorize the sale is an example of which principle?
Question 10
Multiple Choice
The database administrator falls ill and is not able to come to work for three weeks.No one else in the company knows how to administer the database server.This is a result of not following which principle?
Question 11
Multiple Choice
The IDS fails to alert on an intruder's ping sweep and port scan.This is a failure of which element of the operational model of computer security?
Question 12
Multiple Choice
Ensuring that and individual is who they claim to be is the function of _________.
Question 13
Multiple Choice
Reducing the number of services to the least number necessary for it to properly perform its functions is an example of which principle?
Question 14
Multiple Choice
The hacker was successful in breaching the firewall,the packet filtering router,and the internal firewall,but was quickly detected and unable to get past the workstation personal firewall.This is an example of what principle?