What security model implies a central authority that define rules and sometimes global rules, dictating what subjects can have access to what objects?
Which of the following questions is less likely to help in assessing physical and environmental protection?
Which of the following is used by RADIUS for communication between clients and servers?
What would be the name of a Logical or Virtual Table dynamically generated to restrict the information a user can access in a database?
Which access control model is best suited in an environment where a high security level is required and where it is desired that only the administrator grants access control?
Which of the following access control models introduces user security clearance and data classification?
What is the maximum number of different keys that can be used when encrypting with Triple DES?
In what type of attack does an attacker try, from several encrypted messages, to figure out the key used in the encryption process?