
IAS REVIEW
Authored by KEN ROLLOQUE
Arts
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
The access control mechanism whereby unverified or unauthenticated entities who seek access to a resource provide a label by which they are known to the system
2.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
Ø The selective method by which systems specify who may use a particular resource and how they may use it
3.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
The access control mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels.
4.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
Ø The access control mechanism that requires the validation and verification of an unauthenticated entity’s purported identity.
5.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
Ø A private, secure network operated over a public and insecure network.
6.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
Ø a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network
7.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
examines the header information of data packets that come into a network and determines whether to drop them (deny) or forward them to the next network connection (allow), based on its configuration rules.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?