Definition of a set of mutually exclusive roles

Assignment Help Basic Computer Science
Reference no: EM13805245

Part 1: True or False Questions (2 points each).

1. The advantage of a stream cipher is that you can reuse keys.

2. A message authentication code is a small block of data generated by a public key and appended to a message.

3. The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.

4. Public-key algorithms are based on simple operations on bit patterns.

5. User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.

6. Depending on the application, user authentication on a biometric system involves either verification or identification.

7. In a biometric scheme some physical characteristic of the individual is mapped into a digital representation.

8. Any program that is owned by the "superuser" potentially grants unrestricted access to the system to any user executing that program.

9. Security labels indicate which system entities are eligible to access certain resources.

10. Reliable input is an access control requirement.

Part 2: Multiple Choice Questions

1. A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources.

A. passive attack

B. outside attack

C. inside attack

D. active attack

2. The _________ prevents the normal use or management of communications facilities.

A. passive attack

B. denial of service

C. traffic encryption

D. masquerade

3. Maintaining and improving the information security risk management process in response to incidents is part of the _________ step.

A. check

C. act

B. do

D. plan

4. The intent of the ________ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives.

A. risk register

C. vulnerability source

B. corporate security policy

D. threat assessment

5. The _________ approach involves conducting a risk analysis for the organization's IT systems that exploits the knowledge and expertise of the individuals performing the analysis.

A. baseline

C. detailed

B. combined

D. informal

6. _______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with many other controls.

A. Preventative

C. Operational

B. Supportive

D. Detection and recovery

7. Management should conduct a ________ to identify those controls that are most appropriate and provide the greatest benefit to the organization given the available resources.

A. cost analysis

C. benefit analysis

B. business analysis

D. none of the above

8. Maintenance of security controls, security compliance checking, change and configuration management, and incident handling are all included in the followup stage of the _________ process.

A. management

C. maintenance

B. security awareness and training

D. all of the above

9. The ________ access mode allows the subject only write access to the object.

A. read

B. append

C. write

D. execute

10. "An individual (or role) may grant to another individual (or role) access to a document based on the owner's discretion, constrained by the MAC rules" describes the _________.

A. ss-property

C. *-property

B. ds-property

D. cc-property

11. Inserting a new row at a lower level without modifying the existing row at the higher level is known as ________.

A. polyinstantiation

C. trust

B. ds-property

D. MAC

12. The __________ is the encryption algorithm run in reverse.

A. cryptanalysis

C. ciphertext

B. plaintext

D. none of the above

13. __________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.

A. DSS

C. SHA

B. RSA

D. AES

14. A _________ protects against an attack in which one party generates a message for another party to sign.

A. data authenticator

C. secure hash

B. strong hash function

D. digital signature

15. Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the ___________.

A. identification step

B. authentication step

C. verification step

D. corroboration step

16. A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

A. reactive password checking

B. computer-generated password

C. proactive password checking

D. user education

17. A __________ attack is directed at the user file at the host where passwords are stored.

A. eavesdropping

B. client

C. denial-of-service

D. host

18. __________ is the traditional method of implementing access control.

A. MAC

C. DAC

B. RBAC

D. MBAC

19. A __________ is a named job function within the organization that controls this computer system.

A. user

C. permission

B. role

D. session

20. An approval to perform an operation on one or more RBAC protected objects is _________.

A. support

C. exclusive role

B. prerequisite

D. none of the above

Part 3: Short Answers

1. Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is __________.

2. A __________ exploits the characteristics of the algorithm to attempt to deduce the key being used.

3. A __________ processes the input elements continuously, producing output one element at a time.

4. A __________ is one that is unpredictable without knowledge of the input key and which has an apparently random character.

5. With the __________ strategy a user is allowed to select their own password, but the system checks to see if the password is allowable.

6. Objects that a user possesses for the purpose of user authentication are called __________.

7. A __________ attempts to authenticate an individual based on his or her unique physical characteristics.

8. Basic access control systems typically define three classes of subject: ________ .

9. The __________ is exempt from the usual file access control constraints and has system wide access.

10. __________ enables the definition of a set of mutually exclusive roles, such that if a user is assigned to one role in the set, the user may not be assigned to any other role in the set.

Reference no: EM13805245

Questions Cloud

Despite the lack of supportive research : Despite the lack of supportive research, odd-numbered pricing is still used in retailing today. Shouldn't gas stations drop those 0.9 cents from their posted prices and round them to the nearest penny? Explain.
A statistical test on the independence of the two variables : What is the estimated OR (odds ratio) between favoring cutting living standards and paying higher taxes? What is the 95% confidence interval for the true odds ratio?
Philosophy of education statement : Philosophy of Education Statement
Case study-harley davidson : Read the case study located on page 176 of the section titled Case Studies in your textbook and prepare a 7- to 10-page report in a Microsoft Word document, based on the following situation:
Definition of a set of mutually exclusive roles : definition of a set of mutually exclusive roles, such that if a user is assigned to one role in the set, the user may not be assigned to any other role in the set
Explain responsibility of a critical thinker in a society : Research the responsibility of a critical thinker in a contemporary society. You may choose any topic that deals with a contemporary social concern.
The difference in taste between sprite and sierra mist : Assume that the observations are independent of each other. Which hypothesis test is the appropriate one to use in this situation? Why?
What are the issues your organization or group is concerned : What is the organization or group's website. What are the issues your organization or group is concerned with
An automatic transmission and a sun roof based problems : If a citizen who is a Republican is randomly selected, what is the probability that they voted in the last election?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Examine the current content management

Examine the current content management, determine the strengths and weaknesses, and define improvements.

  Rss feed for research

Plagiarizing is serious. Not giving credit in our work where we find our information is considered stealing. Read about a journalist that lost his job for plagiarizing from a blog. Websites are especially difficult to cite correctly.

  The text files boynames.txt

The text files boynames.txt and girlnames.txt contain a list of the 1,000 most popular boy and girl names in the U.S. for the year 2003 as compiled by the Social Security Administration.

  What are different types of memory

What are some of the newer technology innovations you have seen in regards to I/O and Memory? What are the different types of Memory and how much is recommended?

  Amusement park system

Amusement Park System

  Setting up a successful help desk-physical considerations

One of the most critical problems faced by the information technology department in virtually every organization is how to provide effective help to end-users facing problems with the technology. The help desk is the point at which every frustrati..

  Explain people-organizational and technological components

What is meant by information system? How does it work? Write down its people, organizational, and technological components?

  Write a program calculates and displays the pay to workers

Create 3 workers and initialize their member variables with any data you choose. Store the workers in a Linked List. Write a function that will traverse the list of workers calculating and displaying the amount of pay each worker has earned.

  What is the size of a char and a string

What are the sizes in memory of other data types in C++? I mean, I know that a double is 8 bytes and an int is 4 bytes. What is the size of a Char and a String?

  Write a script that creates and calls a stored procedure

Write a script that creates and calls a stored procedure named spInsertProduct that inserts a row into the Products table. This stored procedure should accept five parameters. One parameter for each of these columns

  Perform the arithmetic encoding and decoding

Perform the arithmetic encoding and decoding of the following message ABBCAB$.

  The leading business organizations

Boardman Management Group is one of the leading business organizations of today's time. They are planning to make a resort, Baderman Island Resort. The overall organization is vastly spread in number of countries. It has numerous branches in al..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd