Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)



1

Which of the following security principles ensures that unauthorized individuals are restricted from viewing data to which they are not entitled?
A)Authentication
B)Confidentiality
C)Integrity
D)Nonrepudiation
2

Which security principle commonly uses a user ID and password to verify the identity of an individual?
A)Authentication
B)Availability
C)Integrity
D)Nonrepudiation
3

Which of the following is a hardware device used for authentication?
A)Certificate
B)CHAP
C)Kerberos
D)Token
4

Which security approach takes a granular view of security by focusing on protecting each computer and device individually?
A)Host security
B)Layered security
C)Least privilege
D)Network security
5

Which security approach does the concept of diversity of defense complement the best?
A)Host security
B)Layered security
C)Least privilege
D)Network security
6

Which security principle states that no subject could read information from an object with a security classification higher than that possessed by the subject itself?
A)Integrity Verification process
B)Low-Water-Mark policy
C)Simple Security rule
D)Transformation process
7

Which of the following security approaches uses more than one authentication mechanism simultaneously?
A)Certificate
B)CHAP
C)Kerberos
D)Multifactor
8

Which of the following security policies is implemented by the Bell-LaPadula security model?
A)Integrity Verification process
B)Low-Water-Mark policy
C)*-property
D)Ring policy
9

Which of the following security principles ensures the confidentiality of data?
A)Constrained Data Items
B)Low-Water-Mark policy
C)Simple Security Rule
D)Unconstrained Data Items
10

Which of the following security principles is more concerned with confidentiality rather than Integrity?
A)Constrained Data Items
B)*-property
C)Ring Policy
D)Unconstrained Data Items







Security+ and BeyondOnline Learning Center

Home > Chapter 2 > Multiple Choice Quiz