单选题 Susan has been asked to recommend whether her organization should use a MAC scheme or a DAC scheme. If flexibility and scalability are important requirements for implementing access controls, which scheme should she recommend and why?
Susan 被要求建议她的组织应该使用 MAC 方案还是 DAC 方案。如果灵活性和可扩展性是实施访问控制的重要要求,她应该推荐哪种方案,为什么?

A、 MAC, because it provides greater scalability and flexibility because you can simply add more labels as needed
MAC,因为它提供了更大的可扩展性和灵活性,因为您可以根据需要简单地添加更多标签
B、 DAC, because allowing individual administrators to make choices about the objects they control provides scalability and flexibility
DAC,因为允许个别管理员选择他们控制的对象提供了可扩展性和灵活性
C、 MAC, because compartmentalization is well suited to flexibility and adding compartments will allow it to scale well
MAC,因为分区非常适合灵活性,并且添加分区将使其能够很好地扩展
D、 DAC, because a central decision process allows quick responses and will provide scalability by reducing the number of decisions required and flexibility by moving those decisions to a central authority
DAC,因为中央决策过程允许快速响应,并且将通过将这些决策转移到中央机构来减少所需的决策数量和灵活性,从而提供可扩展性
下载APP答题
由4l***ga提供 分享 举报 纠错

相关试题

单选题 Place the following steps in the order in which they occur during the Kerberos authentica- tion process. 按照在 Kerberos 身份验证过程中发生的顺序放置以下步骤。
1)Client/server ticket generated 生成的客户端/服务器票证
2)TGT generated 生成的 TGT
3)Client/TGS key generated 生成的客户端/TGS 密钥
4)User accesses service 用户访问服务
5)User provides authentication credentials 用户提供身份验证凭据

A、 5, 3, 2, 1, 4
B、 5, 4, 2, 1, 3
C、 3, 5, 2, 1, 4
D、 5, 3, 1, 2, 4

单选题 Which of the following is not a weakness in Kerberos?
以下哪一项不是 Kerberos 的弱点?

A、 The KDC is a single point of failure. KDC 是单点故障。
B、 Compromise of the KDC would allow attackers to impersonate any user. KDC 的妥协将允许攻击者冒充任何用户。
C、 Authentication information is not encrypted. 认证信息未加密。
D、 It is susceptible to password guessing. 它容易受到密码猜测的影响。

单选题 Charles wants to deploy a credential management system (CMS). He wants to keep the keys as secure as possible. Which of the following is the best design option for his CMS implementation?
Charles 想要部署凭证管理系统 (CMS)。他希望尽可能保证密钥的安全。以下哪一项是其 CMS 实施的最佳设计选项?

A、 Use AES-256 instead of 3DES. 使用 AES-256 而不是 3DES。
B、 Use long keys. 使用长键。
C、 Use an HSM. 使用 HSM。
D、 Change passphrases regularly. 定期更改密码。

单选题 Voice pattern recognition is what type of authentication factor?
语音模式识别是什么类型的认证因素?

A、 Something you know 你知道的东西
B、 Something you have 你有的东西
C、 Something you are 你是什么东西
D、 Somewhere you are 你在哪里

单选题 If Susan’s organization requires her to log in with her username, a PIN, a password, and a retina scan, how many distinct authentication factor types has she used?
如果 Susan 的组织要求她使用她的用户名、PIN、密码和视网膜扫描来登录,那么她使用了多少种不同的身份验证因素类型?

A、 One 一
B、 Two 二
C、 Three 三
D、 Four 四

单选题 Brian is a researcher at a major university. As part of his research, he logs into a computing cluster hosted at another institution using his own university’s credentials. Once logged in, he is able to access the cluster and use resources based on his role in a research project, as well as using resources and services in his home organization. What has Brian’s home university implemented to make this happen?
布赖恩是一所重点大学的研究员。作为研究的一部分,他使用自己大学的证书登录到另一个机构托管的计算集群。登录后,他就可以访问集群并根据他在研究项目中的角色使用资源,以及使用他所在组织中的资源和服务。布莱恩的家乡大学采取了什么措施来实现这一目标?

A、 Domain stacking 域堆叠
B、 Federated identity management 联合身份管理
C、 Domain nesting 域嵌套
D、 Hybrid login 混合登录

单选题 Which of the following is best described as an access control model that focuses on subjects and identifies the objects that each subject can access?
以下哪一项最能描述为关注主体并标识每个主体可以访问的客体的访问控制模型?

A、 An access control list 访问控制列表
B、 An implicit denial list 隐式拒绝列表
C、 A capability table 能力表
D、 A rights management matrix 权限管理矩阵

单选题 Jim’s organization-wide implementation of IDaaS offers broad support for cloud-based appli- cations. Jim’s company does not have internal identity management staff and does not use centralized identity services. Instead, they rely upon Active Directory for AAA services. Which of the following options should Jim recommend to best handle the company’s on-site iden- tity needs?
Jim 在组织范围内实施的 IDaaS 为基于云的应用程序提供了广泛的支持。Jim 的公司没有内部身份管理人员,也不使用集中式身份服务。相反,他们依赖 Active Directory 提供 AAA 服务。Jim 应该推荐以下哪个选项来最好地处理公司的现场身份需求?

A、 Integrate on-site systems using OAuth. 使用 OAuth 集成现场系统。
B、 Use an on-premises third-party identity service. 使用本地第三方身份服务。
C、 Integrate on-site systems using SAML. 使用 SAML 集成现场系统。
D、 Design an internal solution to handle the organization’s unique needs. 设计一个内部解决方案来处理组织的独特需求。