Chapter 4 Quiz_ Attempt review
pdf
keyboard_arrow_up
School
Trine University *
*We aren’t endorsed by this school
Course
5003
Subject
Information Systems
Date
Nov 24, 2024
Type
Pages
3
Uploaded by AmbassadorPencilRedPanda44
11/22/23, 2:10 PM
Chapter 4 Quiz: Attempt review
https://courses.campbellsville.edu/mod/quiz/review.php?attempt=2751560&cmid=4283700
1/3
Started on
Friday, October 27, 2023, 1:37 PM
State
Finished
Completed on
Friday, October 27, 2023, 1:42 PM
Time taken
5 mins 23 secs
Grade
100
out of 100
Question
1
Complete
10 points out of 10
Question
2
Complete
10 points out of 10
Question
3
Complete
10 points out of 10
Reliable input is an access control requirement.
Select one:
True
False
The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent
legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an
authorized manner.
Select one:
True
False
An access right describes the way in which a subject may access an object.
Select one:
True
False
11/22/23, 2:10 PM
Chapter 4 Quiz: Attempt review
https://courses.campbellsville.edu/mod/quiz/review.php?attempt=2751560&cmid=4283700
2/3
Question
4
Complete
10 points out of 10
Question
5
Complete
10 points out of 10
Question
6
Complete
10 points out of 10
Question
7
Complete
10 points out of 10
External devices such as firewalls cannot provide access control services.
Select one:
True
False
An auditing function monitors and keeps a record of user accesses to system resources.
Select one:
True
False
Security labels indicate which system entities are eligible to access certain resources.
Select one:
True
False
The default set of rights should always follow the rule of least privilege or read-only access
Select one:
True
False
11/22/23, 2:10 PM
Chapter 4 Quiz: Attempt review
https://courses.campbellsville.edu/mod/quiz/review.php?attempt=2751560&cmid=4283700
3/3
Question
8
Complete
10 points out of 10
Question
9
Complete
10 points out of 10
Question
10
Complete
10 points out of 10
The authentication function determines who is trusted for a given purpose.
Select one:
True
False
Access control is the central element of computer security.
Select one:
True
False
A user may belong to multiple groups.
Select one:
True
False
◄ Previous activity
Jump to...
Next activity
▶
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help