COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
They are least expensive and most secure.
|
|
They are the most expensive and least secure.
|
|
They are the least expensive and provide the least protection.
|
|
They are the most expensive and most secure.
|
Detailed explanation-1: -C . Passwords provide the least amount of protection, but are the cheapest because they do not require extra readers (as with smart cards and memory cards), do not require devices (as do biometrics), and do not require a lot of overhead in processing (as in cryptography).
Detailed explanation-2: -Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options.
Detailed explanation-3: -Expert-Verified Answer. Assurance that the communicating entity is the one claimed best describes Authentication.
Detailed explanation-4: -EXAMPLES OF WEAK PASSWORDS A repeated character or a series of characters (e.g., AAAAA or 12345). A keyboard series of characters (e.g., qwerty or poiuy). Personal information (e.g., birthdays, names of pets or friends, Social Security number, addresses).
Detailed explanation-5: -The Discretionary Access Control, or DAC, model is the least restrictive model compared to the most restrictive MAC model. DAC allows an individual complete control over any objects they own along with the programs associated with those objects.