Exam 4: Account-Based Security
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
In many UNIX systems, including Red Hat Linux, any account that has a UID of 1 automatically has access to anything in the system.
(True/False)
4.7/5
(30)
Are security and other properties that are associated with specific accounts in NetWare configured through user templates before accounts are created?
(True/False)
4.8/5
(41)
Information about groups is stored in the /etc/ shadow file, which typically contains an entry for each group, consisting of the name of the group, an encrypted group password, the GID, and a list of group members.
(True/False)
4.8/5
(35)
List and describe the five roles available in Netware 6.x that relate to managing network services.
(Essay)
4.8/5
(29)
Windows 2003 access rights give the server administrator important security controls over who can access server and Active Directory resources.
(True/False)
4.7/5
(31)
Which User Configuration component controls access to Logon/Logoff capabilities, scripts, and Task Manager functions?
(Multiple Choice)
4.8/5
(38)
Showing 81 - 86 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)