timer Asked: Apr 24th, 2020

Question Description

Attached please find the quiz 18 question with multiple choicesselect the right answer among the four choices

Unformatted Attachment Preview

1) This access control model permits the user to decide to decide how to protect the information and level of sharing. A. Role based access control B. Attribute based Access control C. Discretionary access control D. Mandatory access control 2)_____ refers to cloud computing services that supply a on demand environment for developing, testing, and managing software appliances A. Platform, as a Service (PaaS) B. Software as a Service (SaaS C. Infrastructure as a Service (IaaS) D. Security as a service (SECaaS) 3)This access control model does not permit the user to pass privileges onto other users. A. Mandatory Access control B. Attributed bases Access control C. Role based Access Control D. Discretionary Access control 4) A ______ defines rules and conventions for how networks communicate within one another. A. Security policy B. Network Diagram C. Security Framework D. Network Protocol 5) This is a mechanism to verify that a message came from the sender, providing nonrepudiation. A. Digital Signatures and Certificates B. Role-based Access control C. Authentication D. Attribute based Access Control 6) This access control model assigns access privileges based on the allowed actions the used and is independent of the user’s identity. A. Mandatory Access control B. Role-based Access Control C. Discretionary Access control D. Attribute based Access Control 7) What is the most difficult aspect of the security in a virtualized environment? A. Securing the hardware B. VM sprawl C. Lack of visibility into the virtual network D. Data confidentiality 8) What is used to hide the internal network addresses from external entities? A. Network Intrusion Detection System (NIDS) B. Firewall C. Network Address Translation (NAT) D. None of the listed choices are correct 9) With a ______, all hardware, software, and other supporting infrastructure are owned and managed by the cloud provider. A. Community cloud B. Private cloud C. Public cloud D. Hybrid cloud 10) This defines the process used by a system to verify the identity of a user, process, or service before granting access. A. Auditing B. Authorization C. None of the listed choices are correct D. Authentication 11)At which layer of the OSI model ate the topologies s of a bus, star, ring, and mesh implemented? A. Layer 1: Physical layer B. Layer 2: Data-link layer C. Layer 4: Transport layer D. Layer 3: Network layer 12) Which access control model is the most restrictive model typically used in defense or military organizations where data classification and confidentiality are of prime importance? A. Role-based access control B. Discretionary Access control C. Mandatory Access control D. Attribute-based Access control 13) Which of the following is not an access control type? A. Role-based B. Attribute- based C. Separation of duties D. Discretionary 14) A cryptosystem is a suite of cryptographic algorithms needed to implement a security service, most commonly for achieving confidentiality(encryption). Typically, a cryptosystem consists of three algorithms: one for the decryption, one for the encryption and one for: A. Key generation B. Nonrepudiation C. Digital Signatures and certificates D. Generating ciphertext 15) Which of the following is a symmetric encryption algorithm? A. Message-Digest algorithm version 5 (MD5) B. Advanced Encryption Standard (AES) C. Diffie-Hellman algorithm D. RSA algorithm 16) Of the following, which is least important fr a CISO to be knowledgeable in? A. Digital Forensics B. Network Security Controls C. Networking protocols D. Security Standards 17) You are analyzing a packet and see that it was being routed using a media access control (MAC) address. AT which layer of the OSI model was the packet captured? A. Data-link layer B. Network layer C. Transport layer D. Session layer 18) Which access control model is most flexible and fine grained of all access control types. Access can be granted by IP address, time, dates, resources, objects, privileges, or any combination? A. Role0based Access control B. Discretionary Access control C. Attribute-based Access control D. Mandatory Access Control ...
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors