1.
To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:
2.
Rule-Based Access Control (RuBAC) access is determined by rules. Such rules would fit within what category of access control ?
3.
The type of discretionary access control (DAC) that is based on an individual's identity is also called:
4.
Which access control type has a central authority that determine to what objects the subjects have access to and it is based on role or on the organizational security policy?
5.
What is called the type of access control where there are pairs of elements that have the least upper bound of values and greatest lower bound of values?
6.
Which of the following control pairing places emphasis on "soft" mechanisms that support the access control objectives?
7.
Which of the following control pairings include: organizational policies and procedures, pre-employment background checks, strict hiring practices, employment agreements, employee termination procedures, vacation scheduling, labeling of sensitive materials, increased supervision, security awareness training, behavior awareness, and sign-up procedures to obtain access to information systems and networks?
8.
Technical controls such as encryption and access control can be built into the operating system, be software applications, or can be supplemental hardware/ software units. Such controls, also known as logical controls, represent which pairing?
9.
What is called the use of technologies such as fingerprint, retina, and iris scans to authenticate the individuals requesting access to resources?
10.
What are called user interfaces that limit the functions that can be selected by a user?