Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CIST 1601 Test

Enter the letter for the matching Definition
incorrect
1.
AAA of Access Control
incorrect
2.
MAC
incorrect
3.
DACL
incorrect
4.
DAC
incorrect
5.
CDAC
incorrect
6.
SAML
incorrect
7.
FIM
incorrect
8.
RBAC
incorrect
9.
ACL
incorrect
10.
CBAC
A.
-Mandatory Access Control -Access control model
B.
-Access Control List -Method of access control
C.
-Discretionary Access Control List -Type of access control list
D.
-Security Assertion Markup Language -XML standard
E.
-Context-Based Access Control -Access Control Model
F.
-Role-Based Access Control -Access control model
G.
-Discretionary Access Control -Access control model
H.
-Federated Identity Management -Lets subscribers use the same identification to access multiple enterprises' networks
I.
-Authentication, Authorization, and Auditing -Processes necessary for access control
J.
-Content Dependent Access Control -Access control model
Type the Term that corresponds to the displayed Definition.
incorrect
11.
-Confidentiality, Integrity, and Availability. -Also includes Non-repudiation. -The three main goals of security.
incorrect
12.
-Rule Set-Based Access Control -Access control model
incorrect
13.
-Temporal Role-Based Access Control -Subcategory of DAC -Access control model
incorrect
14.
-Rule Set-Based Access Control List -Type of access control list

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: khighfill1
Popular Computers sets