Enriquez, Jayson G.

1. It allows users and their applications to share and access common computer resources, such as processors, main memory, databases, and printers. a. Access token c. Operating System b. Log on procedure d. Operating system security This involves policies, procedures, and controls that determine who can access the operating system, which resources they can use, and what actions they can take. a. Access token c. Operating System b. Log on procedure d. Operating system security This is the operating system’s first line of defense against unauthorized access. a. Access token c. Operating System b. Log on procedure d. Operating system security This contains key information about the user, including user ID, password, user group, and privileges granted to the user. a. Access token c. Operating System b. Log on procedure d. Operating system security This is assigned to each IT resource (computer directory, data file, program, or printer), which controls access to the resources. a. Discretionary Access Privileges c. Password b. Access control list d. Reusable passwords This is a secret code the user enters to gain access to systems, applications, data files, or a network server. a. Discretionary Access Privileges c. Password b. Access control list d. Reusable passwords This is granted to resource owners which allow them to grant access privileges to other users. a. Discretionary Access Privileges c. Password b. Access control list d. Reusable passwords This is the most common method of password control. a. Discretionary Access Privileges c. Password b. Access control list d. Reusable passwords Under this approach, the user’s password change continuously. a. One time passwords c. Keystroke monitoring b. System audit trails d. Event monitoring

2.

3.

4.

5.

6.

7.

8.

9.

10. Logs that record activity at the system, application, and user level. a. One time passwords c. Keystroke monitoring b. System audit trails d. Event monitoring

Sign up to vote on this title
UsefulNot useful