COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What are three examples of administrative access controls? (Choose three.)
A
encryption
B
hiring practices
C
background checks
D
guard dogs
E
policies and procedures
Explanation: 

Detailed explanation-1: -policies and procedures. encryption. background checks. hiring practices. intrusion detection system (IDS) guard dogs. 23-May-2022

Detailed explanation-2: -Three main access control models are in use today: Role-Based Access Control (RBAC), Discretionary Access Control (DAC), and Mandatory Access Control (MAC). In RBAC, the job function of the individual determines the group he is assigned to and determines the level of access he can attain on certain data and systems.

Detailed explanation-3: -Examples include physical controls such as fences, locks, and alarm systems; technical controls such as antivirus software, firewalls, and IPSs; and administrative controls like separation of duties, data classification, and auditing.

Detailed explanation-4: -Information classification. Personnel procedures. Investigations. Testing. Security-awareness and training.

Detailed explanation-5: -Discretionary access control (DAC) A discretionary access control system, on the other hand, puts a little more control back into leadership’s hands. Rule-based access control. Identity-based access control. 09-Mar-2023

There is 1 question to complete.