Team 1
0
Team 2
0
Teams
Name
Score
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Loading
15
×
Reputation is an example of this.
intangible asset
Oops!
Check
Okay!
Check
15
×
What are the three key components to access control?
tamper proof, always invoked, verifiable
Oops!
Check
Okay!
Check
15
×
Printer, file, application, process, server, memory, building and network are all examples of these.
objects
Oops!
Check
Okay!
Check
×
heart
Other team wins 5 points!
Oops!
×
magnet
Take 20 points!
Okay!
×
rocket
Go to first place!
Okay!
×
banana
Go to last place!
Oops!
15
×
Separation of duties can be bypassed by this.
collusion
Oops!
Check
Okay!
Check
15
×
What is access control?
Access control is the sum total of security. It is who can gain access and what they can do when they get there.
Oops!
Check
Okay!
Check
15
×
These are passive. They respond to a request and have a classification level.
Objects
Oops!
Check
Okay!
Check
15
×
These are active. They request service and initiate activity. They have clearance levels.
Subjects
Oops!
Check
Okay!
Check
×
banana
Go to last place!
Oops!
×
star
Double points!
Okay!
×
gift
Win 25 points!
Okay!
×
lifesaver
Give 15 points!
Oops!
15
×
These are 3 components tied to Privilege Levels.
identify, authenticate, authorize subjects
Oops!
Check
Okay!
Check
15
×
Physical access and logical access are examples of this.
layered defense
Oops!
Check
Okay!
Check
15
×
Money is an example of this.
tangible asset
Oops!
Check
Okay!
Check
15
×
Assets can fall into these two categories.
tangible and intangible
Oops!
Check
Okay!
Check
×
baam
Lose 25 points!
Oops!
×
shark
Other team loses 5 points!
Okay!
×
rocket
Go to first place!
Okay!
×
banana
Go to last place!
Oops!
15
×
Facilities --> Network --> Desktops --> Applications --> Data are an example of this.
Physical Access
Oops!
Check
Okay!
Check
15
×
Access control must have these 2 items.
rules and logs
Oops!
Check
Okay!
Check
×
Restart
Review
Join for Free
;
Your experience on this site will be improved by allowing cookies.
Allow cookies