
POCS-Ch. 3.2 (Vocab)
Flashcard
•
Computers
•
7th - 12th Grade
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

20 questions
Show all answers
1.
FLASHCARD QUESTION
Front
All points or areas in a system that could be used or compromised to allow hackers entry into the system
Back
attack surface
2.
FLASHCARD QUESTION
Front
Security strategy in which a user can be granted additional rights to data beyond what is allowed by his or her assigned access level.
Back
Discretionary Access Control (DAC)
3.
FLASHCARD QUESTION
Front
Ratio of the number of false rejections divided by the number of identification attempts
Back
false rejection rate (FRR)
4.
FLASHCARD QUESTION
Front
Allows semi-independent systems to work together so users of one system can access resources from another system.
Back
federated identity management (FID)
5.
FLASHCARD QUESTION
Front
Those a user receives by default at a lower level.
Back
inherited permissions
6.
FLASHCARD QUESTION
Front
Those a user is given at a specific location, such as a folder or a file.
Back
explicit permissions
7.
FLASHCARD QUESTION
Front
Process of validating a user.
Back
authentication
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?