In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).
An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.
In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.
A.cooperates
B.coordinates
C.connects
D.mediates
第1题:
Which two statements apply to dynamic access lists?()
第2题:
What is the goal of the borderless network architecture?()
第3题:
When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()
第4题:
You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()
第5题:
Third-party due diligence policy review
Remote Access Policy
Encryption Policy
Application change control policy
Security Personnel policy
第6题:
Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
Configure a security policy that references the unified-access-control captive-portal service.
Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
Configure a security policy that references the unified-access-control intranet-controller service.
第7题:
they offer simpler management in large internetworks.
you can control logging messages.
they allow packets to be filtered based on upper-layer session information.
you can set a time-based security policy.
they provide a level of security against spoofing.
they are used to authenticate individual users.
第8题:
Session length
User browser information
Session IP address
User identity information
第9题:
catalyst switches
adaptive security appliances
intrusion prevention systems
protect link gateway
第10题:
The ability to detect and prevent malicious traffic.
The ability to associate security breaches with a specific user.
Converged management of network and security events, network flow data, and identity information.
Consistent device management across administrative realms.
第11题:
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
第12题:
What is the goal of the borderless network architecture?()
第13题:
The root id is set so that direct login is disabled. Information must be reviewed relating to when root access was obtained. In which of the following files is this information located?()
第14题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 instance is managed by you. The security requirements should be designed for a new database application. A code segment is utilized by the application, and the code segment includes the following components: A method that the registry is accessed on the SQL Server, a method that the file system is accessed on a network file server, and a class definition that public static fields are utilized. SQL CLR integration is utilized by the code segment, and the code segment is implemented as a single assembly. Since you are the technical support, you are required to make sure that the application should be successfully deployed to the instance. Which action will you perform?()
第15题:
to provide users withA single device that permits access to information anywhere
to provide users with the same productivity and access to information no matter where are or which device they use
to eliminate the need for border security and firewalls
to provide companies withA way to extend their security and control over employees on the internet
第16题:
they offer simpler management in large internetworks.
you can control logging messages.
they allow packets to be filtered based on upper-layer session information.
you can set a time-based security policy.
they provide a level of security against spoofing.
they are used to authenticate individual users
第17题:
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP
第18题:
/var/adm/sulog
/var/adm/wtmp
/etc/security/user
/etc/security/failedlogin
第19题:
A Cisco Integrated Security Solution uses the Cisco UN to form a layered and integratednetwork of protection that enables the enforcement of security policies throughout theinfrastructure.
A Cisco Integrated Security Solution provides software tools that allow customers to centrallymanage their network security policies.
in contrast to point products, the Cisco SDN is a system of defense that leverages the ubiquitous sensing and control capabilities of the network. Each part communicates with the otherto strengthen protection across the entire infrastructure.
A Cisco Integrated Security Solution enables barriers that serve as both physical and virtualprotection against possible threats. Security barriers include firewalls, authentication products,access control products, and tunneling and encryption techniques.
第20题:
to provide users with A single device that permits access to information anywhere
to provide users with the same productivity and access to information no matter where are or which device they use
to eliminate the need for border security and firewalls
to provide companies with A way to extend their security and control over employees on the internet