Procura

Segurança da informaçãoControles de segurança


EXERCÍCIOS - Exercício 1

  • (FCC 2017)

Consider the statements below.

I. It is defined as a procedure requiring the combination of several factors, including at least two of the following: Knowledge-something the user knows, e.g., a password, a personal identification number (PIN); Ownership-something the user has, e.g., token, smart card, mobile phone/SIM; Inherence − something the user is, e.g., fingerprint. It is worth highlighting that the aforementioned requirement of having mutually independent factors could be difficult to match. In fact, in the context of access to Internet services, when using ownership and inherence factors as well as when inputting a PIN or password, the user transmits digital data to the verifying counterpart, so that regardless of the generating factor, susceptibility to interception is a common vulnerability.

II. Security administration can be costly and prone to error because administrators usually specify access control lists for each user on the system individually. With this kind of control, security is managed at a level that corresponds closely to the organization's structure. Each user is assigned one or more roles, and each role is assigned one or more privileges that are permitted to users in that role. Security administration with it consists of determining the operations that must be executed by persons in particular jobs, and assigning employees to the proper roles. Complexities introduced by mutually exclusive roles or role hierarchies are handled by its software, making security administration easier.

The statements I and II refers respectively to




A) ABNT NBR ISO/IEC 27001:2013 − ABNT NBR ISO/IEC 27005:2011

B) ABNT NBR ISO/IEC 27005:2011 − ABNT NBR ISO/IEC 27002:2013

C) Multiple Factor Authentication − RBAC (Role Based Access Control)

D) Multiple Factor Authentication − SSO (Single Sign-On)

E) SSO (Single Sign-On) − RBAC (Role Based Access Control)


Próximo:
EXERCÍCIOS - Exercício 2

VOLTAR ao índice: Segurança da informação






Cadastre-se e ganhe o primeiro capítulo do livro.
+
((ts_substr_ig=0.00ms))((ts_substr_id=13.51ms))((ts_substr_m2=0.00ms))((ts_substr_p2=0.50ms))((ts_substr_c=0.49ms))((ts_substr_im=0.91ms))
((total= 15ms))