Answer the following statements true (T) or false (F)
1. Access control is the central element of computer security.
2. The authentication function determines who is trusted for a given purpose.
3. An auditing function monitors and keeps a record of user accesses to
system resources.
4. External devices such as firewalls cannot provide access control services.
5. The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.
1. True
2. False
3. True
4. False
5. True
You might also like to view...
In what order will the nodes be visited using a postorder, a preorder, an inorder, and a level-order traversal?
Consider the following tree structure. A / \ B C / \ \ D E F
When two applications communicate over the Internet, which one is the server?
What will be an ideal response?