ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 968 - CISSP discussion

Report
Export

How does security in a distributed file system using mutual authentication differ from file security in a multi-user host?

A.
Access control can rely on the Operating System (OS), but eavesdropping is
Answers
A.
Access control can rely on the Operating System (OS), but eavesdropping is
B.
Access control cannot rely on the Operating System (OS), and eavesdropping
Answers
B.
Access control cannot rely on the Operating System (OS), and eavesdropping
C.
Access control can rely on the Operating System (OS), and eavesdropping is
Answers
C.
Access control can rely on the Operating System (OS), and eavesdropping is
D.
Access control cannot rely on the Operating System (OS), and eavesdropping
Answers
D.
Access control cannot rely on the Operating System (OS), and eavesdropping
Suggested answer: C
asked 18/09/2024
Paulina Radziszewska
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first