In the fields of physical security and information security,access control is the selective restriction of access to a place or

admin2017-09-14  17

问题 In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).
    An access control mechanism  (1)  between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is  (2) to access the system at a11.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to  (3) access.An auditing function monitors and keeps a record of user accesses to system resources.
    In practice,a number of  (4) may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add—on security packages can add to the (5)  access controlcapabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.
(5)

选项 A、remote
B、native
C、controlled
D、automated

答案B

解析 在物理安全和信息安全领域,访问控制是访问一个地方或其他资源的选择性限制。访问的行为可能是消耗、进入或使用。访问资源的权限称为授权。
    访问控制机制介于用户(或代表用户的过程的执行)和系统资源之间,资源如应用程序、操作系统、防火墙、路由器、文件和数据库。系统必须首先认证用户的访问企图。典型的,认证功能确定一个用户是否被允许访问该系统。然后,访问控制功能确定此用户的特定访问请求是否允许。安全管理员维护授权数据库,其中指定用户可以访问对那个资源具有什么类型的访问权限。访问控制功能查询数据库以确定是否授权访问。审计功能监控和记录用户对系统资源的访问。
    实际上,很多组件可以一起合作提供访问控制功能。所有操作系统至少具有基本的访问控制组件,而且这些组件大多情况下非常健壮。附加安全包可以添加到操作系统的本地安全控制功能。特定的应用和实用工具,如数据管理系统,也并入了访问控制功能。如防火墙等外部设备也能够提供访问控制服务。
转载请注明原文地址:https://jikaoti.com/ti/YEf7FFFM
0

相关试题推荐
最新回复(0)