CYB 216 Midterm Questions and Answers- National University College
Question 1 (4 points)
True or False? Least common mechanism, an access
... [Show More] control
design principle, says that access control mechanisms should
be as simple as possible, using as few components and
procedures as necessary to meet the requirements.
Question 1 options:
True
False
Question 2 (4 points)
True or False? The Federal Information Security Modernization
Act (FISMA) sets forth security requirements for the payment
card industry.
Question 2 options:
True
False
Question 3 (4 points)
Which access control subject has not presented authenticated
credentials?
Question 3 options:
A) Unknown
B) Accounted
C) Unauthorized
D) Authorized
Question 4 (4 points)
True or False? Auditing, both internally and by an external
firm, is a common way to ensure that all
transactions are legitimate and complete.
Question 4 options:
True
False
Question 5 (4 points)
True or False? The PCI Security Standards Council (PCI SSC)
develops the payment card industry (PCI) security standards.
Question 5 options:
True
False
Question 6 (4 points)
Regarding the competitive use of information, the value of
information depends on:
Question 6 options:
A) strategic and tactical importance.
B) strategic, tactical, and timely importance.
C) strategic importance only.
D) tactical importance only.
Question 7 (4 points)
Webpage files are considered to be "data at rest" while they
are sent from a web server to a web browser.
Question 7 options:
True
False
Question 8 (4 points)
True or False? Most security breaches are performed by
disgruntled employees and former employees rather than
external attackers.
Question 8 options:
True
False
Question 9 (4 points)
For a pre-employment screening, what form of information can
be used only to determine the applicant's ability to perform
their job function?
Question 9 options:
A) School records
B) Driving records
C) Criminal reports
D) Medical records
Question 10 (4 points)
Implicitly delegated rights are access rights that are actively
given to a user by an object owner; explicitly delegated rights
happen automatically due to previously delegated rights from
the object owner.
.
.
.
.
.
. [Show Less]