ww3 Finals Assignment 3 - M5u3

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

WW3: Finals Assignment #3 - M5U3

Module 5 - Unit 3

1) What are the four processes of an access control system?

- The four processes of an access control system

2) Users should only be granted the minimum sufficient permissions. What system policy
ensures that users do not receive rights unless granted
explicitly?

-The system policy that ensures the user that do not receive rights unless explicitly is the Implicit
deny.

3) What is the main type of non-discretionary access control?

-The main type of non-discretionary access control is a mandatory access control.

4) What type of control prevents a user from denying they performed an action?

-The type of control that prevents a user from denying that they performed an action is the non-
repudiation.

5) What sort of account allows someone to access a computer without providing a user name or
password?

-The account that allows someone to access a computer without providing a user name or
password is a guest account.

6) How does a one-time password work?

- One-time password work by the asymmetric encryption algorithm that authenticating server
determines that a number was generated by a particular device at a particular time.

7) What type of system allows a user to authenticate once to access multiple services?

-The system that allows a user to authenticate once to access multiple services is a single sign-
on.

8) What type of cryptographic operation(s) are non-reversible?

-The cryptographic operation that are non-reversible is a hashing.


WW3: Finals Assignment #3 - M5U3

9) What class of data is a transport encryption protocol designed to protect?

-The class of data that is a transport encryption protocol that is designed to protect is the data in
transit or data in motion.

10) Why is it important not to use simple words or names as a password?

-
It is important not to use a simple words or name as a password so that it will not be easy to
access by any password cracking software and to prevent others on discovering a users
password.

You might also like