Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)



1

Which of the following is a disadvantage of centralized management?
A)Central control makes systems easier to audit and manage.
B)Central control requires dedicated personnel and resources.
C)It is easier to implement new capabilities and processes centrally.
D)Fewer people must be trained on privileged management tasks.
2

Which of the following is NOT an advantage of decentralized management?
A)Bureaucracy in a decentralized system is kept to a minimum.
B)It does not require a dedicated set of personnel and resources.
C)It produces different approaches in each department and office.
D)The model is flexible, as changes can be made whenever necessary.
3

The type of auditing that helps find accounts with more privileges than they should have, or otherwise, is called ____ auditing.
A)escalation
B)privilege
C)process
D)usage
4

Which of the following types of auditing is done by a process that records actions and stores them in a file for later analysis of who did what and when?
A)Escalation
B)Privilege
C)Process
D)Usage
5

Which of the following auditing processes looks for unexpected or unauthorized increases in rights and privileges?
A)Escalation
B)Privilege
C)Process
D)Usage
6

Under a ____ access control system, each piece of information and every system resource is labeled with its sensitivity level.
A)discretionary
B)mandatory
C)media
D)role-based
7

Which of the following access control systems is NOT a part of privilege management?
A)Discretionary
B)Mandatory
C)Media
D)Role-based
8

Under ____ access control, the activities to be performed must be determined first, and then the resources that must be accessed by specific roles.
A)Discretionary
B)Mandatory
C)Media
D)Role-based
9

Which of the following statements is NOT a characteristic of mandatory access control?
A)Each piece of information and every resource is labeled with its sensitivity level.
B)It first creates all the roles and then determines the rights of those roles.
C)It is the process of controlling access to information based on its sensitivity.
D)Users are assigned a clearance level that sets the access levels on information.
10

The process of checking the rights and privileges assigned to a specific account or group of accounts is called ____ auditing.
A)escalation
B)privilege
C)process
D)usage







Security+ and BeyondOnline Learning Center

Home > Chapter 22 > Multiple Choice Quiz