COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which three processes are examples of logical access controls? (Choose three.)
A
swipe cards to allow access to a restricted area
B
biometrics to validate physical characteristics
C
firewalls to monitor traffic
D
intrusion detection system (IDS) to watch for suspicious network activity
E
fences to protect the perimeter of a building
Explanation: 

Detailed explanation-1: -Biometrics to validate physical characteristics. Firewalls to monitor traffic. Swipe cards to allow access to a restricted area. Guards to monitor security screens. Fences to protect the perimeter of a building. More items •23-May-2022

Detailed explanation-2: -Logical access control is done via access control lists (ACLs), group policies, passwords, and account restrictions.

Detailed explanation-3: -Which one of the following is an example of a logical access control? Logical access controls restrict access to a computer system or network and a password is the most common example. Physical keys, access cards, and fences are all examples of physical access controls.

Detailed explanation-4: -Common physical access control examples of access points include security gate systems, turnstiles and door locks.

Detailed explanation-5: -Discretionary access control (DAC) A discretionary access control system, on the other hand, puts a little more control back into leadership’s hands. Rule-based access control. Identity-based access control. 09-Mar-2023

There is 1 question to complete.