Exam 4: Account-Based Security
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
Which functional area in the Windows Server 2003 is used to control the use of keys and algorithms for encryption?
(Multiple Choice)
4.8/5
(34)
In Red Hat Linux, is an account enabled by default even if there is no password specified when the account is created?
(True/False)
5.0/5
(43)
In UNIX/Linux, when two or more groups use the same ______________________________, there is a serious security risk.
(Short Answer)
5.0/5
(38)
To configure the security settings for an account, open the Red Hat Security Manager and select the account you want to configure.
(True/False)
4.7/5
(40)
Which preconfigured Windows Server 2003 administrative template is used for managing Internet Explorer in Windows 2000 Professional clients?
(Multiple Choice)
4.7/5
(47)
Which of the following options is available in the account properties Address tab?
(Multiple Choice)
4.8/5
(31)
The first step in developing an account policy in a company is usually to establish conventions for account names .
(True/False)
4.9/5
(41)
What are the four ways the Mac OS X can be customized for different logon options?
(Essay)
4.8/5
(28)
The Mac OS X Server Admin tool allows you to create and manage accounts and groups.
(True/False)
4.9/5
(35)
Which account properties Dial-in tab option enables the server to verify that a call is from a known location?
(Multiple Choice)
4.8/5
(36)
How are new accounts set up for servers that use Active Directory?
(Multiple Choice)
4.8/5
(37)
Which functional area in the Windows Server 2003 is used to govern the certificate rules that are used on applications?
(Multiple Choice)
5.0/5
(29)
Accounts in NetWare 6.x can be created using the ConsoleOne tool.
(True/False)
4.8/5
(36)
In Red Hat Linux, user accounts and groups can be created by editing the password, shadow, and group files.
(True/False)
4.8/5
(35)
A Netware 6.x user template , is an object stored in NDS that contains properties associated with designated accounts.
(True/False)
4.8/5
(41)
What password restriction information is contained in the shadow file?
(Essay)
4.9/5
(40)
Does Windows 2000 Server allow the administrator to set the account lockout option, so that an account is inaccessible for a specified time after a specified number of unsuccessful attempts to log on?
(True/False)
4.8/5
(34)
Which useradd command parameter specifies an account expiration date?
(Multiple Choice)
4.8/5
(34)
Showing 61 - 80 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)