niusouti.com

In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorizatio

题目

In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).

An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.

In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.

A.cooperates

B.coordinates

C.connects

D.mediates


相似考题
更多“In the fields of physical security and information security,access control is the selectiv ”相关问题
  • 第1题:

    Which two statements apply to dynamic access lists?()

    • A、they offer simpler management in large internetworks.
    • B、you can control logging messages.
    • C、they allow packets to be filtered based on upper-layer session information.
    • D、you can set a time-based security policy.
    • E、they provide a level of security against spoofing.
    • F、they are used to authenticate individual users

    正确答案:C,D

  • 第2题:

    What is the goal of the borderless network architecture?()

    • A、to provide users with A single device that permits access to information anywhere
    • B、to provide users with the same productivity and access to information no matter where are or which device they use
    • C、to eliminate the need for border security and firewalls
    • D、to provide companies with A way to extend their security and control over employees on the internet

    正确答案:B

  • 第3题:

    When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

    • A、Third-party due diligence policy review
    • B、Remote Access Policy
    • C、Encryption Policy
    • D、Application change control policy
    • E、Security Personnel policy

    正确答案:A,B,D

  • 第4题:

    You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()

    • A、Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.
    • B、Use security templates to create a security template file and import the security settings to modify the default security settings.
    • C、Use the local computer policy to disable the access to this computer from the network option.
    • D、Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

    正确答案:A

  • 第5题:

    多选题
    When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()
    A

    Third-party due diligence policy review

    B

    Remote Access Policy

    C

    Encryption Policy

    D

    Application change control policy

    E

    Security Personnel policy


    正确答案: E,B
    解析: 暂无解析

  • 第6题:

    多选题
    You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
    A

    Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.

    B

    Configure a security policy that references the unified-access-control captive-portal service.

    C

    Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.

    D

    Configure a security policy that references the unified-access-control intranet-controller service.


    正确答案: D,C
    解析: 暂无解析

  • 第7题:

    多选题
    Which two statements apply to dynamic access lists?()
    A

    they offer simpler management in large internetworks.

    B

    you can control logging messages.

    C

    they allow packets to be filtered based on upper-layer session information.

    D

    you can set a time-based security policy.

    E

    they provide a level of security against spoofing.

    F

    they are used to authenticate individual users.


    正确答案: C,A
    解析: 暂无解析

  • 第8题:

    多选题
    What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()
    A

    Session length

    B

    User browser information

    C

    Session IP address

    D

    User identity information


    正确答案: D,A
    解析: 暂无解析

  • 第9题:

    单选题
    Which Cisco product family can simultaneously implement firewall, VPN, content security, network access control, virtualization, anD content filtering?()
    A

    catalyst switches

    B

    adaptive security appliances

    C

    intrusion prevention systems

    D

    protect link gateway


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
    A

    The ability to detect and prevent malicious traffic.

    B

    The ability to associate security breaches with a specific user.

    C

    Converged management of network and security events, network flow data, and identity information.

    D

    Consistent device management across administrative realms.


    正确答案: C,B
    解析: 暂无解析

  • 第11题:

    What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()

    • A、The ability to detect and prevent malicious traffic.
    • B、The ability to associate security breaches with a specific user.
    • C、Converged management of network and security events, network flow data, and identity information.
    • D、Consistent device management across administrative realms.

    正确答案:B,C

  • 第12题:

    What is the goal of the borderless network architecture?()

    • A、to provide users withA single device that permits access to information anywhere
    • B、to provide users with the same productivity and access to information no matter where are or which device they use
    • C、to eliminate the need for border security and firewalls
    • D、to provide companies withA way to extend their security and control over employees on the internet

    正确答案:B

  • 第13题:

    The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()

    • A、 /var/adm/sulog 
    • B、 /var/adm/wtmp 
    • C、 /etc/security/user 
    • D、 /etc/security/failedlogin

    正确答案:A

  • 第14题:

    You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance.    Which action will you perform?()

    • A、The SAFE code access security should be utilized for the assembly.
    • B、All public static fields should be replaced with public fields.
    • C、All public static fields should be utilized with public static read-only fields. And then the assembly shouldbe registered by utilizing the regasm.exe utility before deployment.
    • D、All public static fields should be replaced with public static read-only fields. And then the EXTERNAL_ACCESS code access security should be utilized for the assembly.

    正确答案:D

  • 第15题:

    单选题
    What is the goal of the borderless network architecture?()
    A

    to provide users withA single device that permits access to information anywhere

    B

    to provide users with the same productivity and access to information no matter where are or which device they use

    C

    to eliminate the need for border security and firewalls

    D

    to provide companies withA way to extend their security and control over employees on the internet


    正确答案: D
    解析: 暂无解析

  • 第16题:

    多选题
    Which two statements apply to dynamic access lists?()
    A

    they offer simpler management in large internetworks.

    B

    you can control logging messages.

    C

    they allow packets to be filtered based on upper-layer session information.

    D

    you can set a time-based security policy.

    E

    they provide a level of security against spoofing.

    F

    they are used to authenticate individual users


    正确答案: F,D
    解析: 暂无解析

  • 第17题:

    单选题
    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
    A

    Source IP and browser

    B

    Source IP and certificate

    C

    Certificate and Host Checker

    D

    Host Checker and source IP


    正确答案: B
    解析: 暂无解析

  • 第18题:

    单选题
    The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()
    A

     /var/adm/sulog 

    B

     /var/adm/wtmp 

    C

     /etc/security/user 

    D

     /etc/security/failedlogin


    正确答案: D
    解析: 暂无解析

  • 第19题:

    多选题
    You are meeting with a customer who is concerned about improving employee productivity. Whatare two ways that you should position the Cisco SDN with this customer?()
    A

    A Cisco Integrated Security Solution uses the Cisco UN to form a layered and integratednetwork of protection that enables the enforcement of security policies throughout theinfrastructure.

    B

    A Cisco Integrated Security Solution provides software tools that allow customers to centrallymanage their network security policies.

    C

    in contrast to point products, the Cisco SDN is a system of defense that leverages the ubiquitous sensing and control capabilities of the network. Each part communicates with the otherto strengthen protection across the entire infrastructure.

    D

    A Cisco Integrated Security Solution enables barriers that serve as both physical and virtualprotection against possible threats. Security barriers include firewalls, authentication products,access control products, and tunneling and encryption techniques.


    正确答案: B,C
    解析: 暂无解析

  • 第20题:

    单选题
    What is the goal of the borderless network architecture?()
    A

    to provide users with A single device that permits access to information anywhere

    B

    to provide users with the same productivity and access to information no matter where are or which device they use

    C

    to eliminate the need for border security and firewalls

    D

    to provide companies with A way to extend their security and control over employees on the internet


    正确答案: D
    解析: 暂无解析