QUESTION 6 Which access control type would be used to grant permissions based on the specific duties that must be performed? Discretionary access control Rule-based access control Role-based access control Mandatory access control QUESTION 7 Which term refers to a process by which the user escalates their privilege level, bypassing the operating system's controls and limitations? Jailbreaking BYOD Off-boarding Segmentation QUESTION 8 Wireless Transport Layer Security (WTLS) is a lightweight protocol designed for mobile devices. True False
QUESTION 6
-
Which access control type would be used to grant permissions based on the specific duties that must be performed?
Discretionary access control
Rule-based access control
Role-based access control
Mandatory access control
QUESTION 7
-
Which term refers to a process by which the user escalates their privilege level, bypassing the
operating system's controls and limitations?Jailbreaking
BYOD
Off-boarding
Segmentation
QUESTION 8
-
Wireless Transport Layer Security (WTLS) is a lightweight protocol designed for mobile devices.
True
False
QUESTION 9
-
What does a host-based IDS monitor?
Activity on an individual system
Activity on the network itself
A digital sandbox
A honeynet
QUESTION 10
-
Hostile activity that does not match an IDS signature and goes undetected is called a false positive.
True
False
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 2 images