Exam 9: Access Control Fundamentals
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
____ is considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
(Multiple Choice)
4.8/5
(33)
A RADIUS ____________________ is a computer that forwards RADIUS messages among RADIUS clients and RADIUS servers.
(Short Answer)
4.7/5
(41)
A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources.
(True/False)
4.9/5
(43)
The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
(Multiple Choice)
4.8/5
(38)
____ attacks may allow an attacker to construct LDAP statements based on user input statements.
(Multiple Choice)
4.9/5
(32)
Often ____________________ results from a single user being trusted with a set of responsibilities that place the person in complete control of the process.
(Short Answer)
4.8/5
(29)
____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
(Multiple Choice)
4.8/5
(39)
The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server.
(True/False)
4.9/5
(43)
A user under Role Based Access Control can be assigned only one ____.
(Multiple Choice)
4.8/5
(32)
____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.
(Multiple Choice)
4.7/5
(34)
TACACS+ and RADIUS are designed to support hundreds of remote connections.
(True/False)
4.8/5
(26)
A user accessing a computer system must present credentials or ____ when logging on to the system.
(Multiple Choice)
4.8/5
(34)
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
(Multiple Choice)
4.8/5
(35)
A shield icon warns users if they attempt to access any feature that requires UAC permission.
(True/False)
4.8/5
(31)
____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
(Multiple Choice)
4.8/5
(28)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)