Access Control and Identity Management
SKILLSET
Security features governing who can access resources in the operating system.
Related Questions
- Which of the following refers to the ability to ensure that the data is not modified or tampered with?
- An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?
- Which of the following is the most secure method of authentication?
- Which of the following ensures that a party to a dispute cannot deny the authenticity of their signature on a document or the sending of a message that they originated?
- Della works as a security engineer for BlueWell Inc. She wants to establish configuration management and control procedures that will document proposed or actual changes to the information system. Which of the following phases of NIST SP 800-37 C&A methodology will define the above task?
- Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
- Microsoft software security expert Michael Howard defines some heuristics for determining code review in "A Process for Performing Security Code Reviews". Which of the following heuristics increase the application's attack surface? Each correct answer represents a complete solution.Choose all that apply.
- Which of the following authentication methods is used to access public areas of a Web site?
- Which of the following are examples of passive attacks? Each correct answer represents a complete solution. Choose all that apply.
- What are the subordinate tasks of the Implement and Validate Assigned IA Control phase in the DIACAP process? Each correct answer represents a complete solution. Choose all that apply.