Exam 5: Access Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A Microsoft domain can have multiple domain controllers.

(True/False)
4.9/5
(40)

A(n) ________ is the set of attributes about a person or resource that must be revealed in a particular context.

(Multiple Choice)
4.8/5
(43)

Which of the following is one of the four bases for authentication credentials?

(Multiple Choice)
4.8/5
(42)

________ is the centralized policy based management of all information required for access to corporate systems by people, machines, programs, or other resources.

(Multiple Choice)
4.9/5
(35)

CAs distribute public keys ________.

(Multiple Choice)
4.8/5
(34)

In the military, departments do not have the ability to alter access control rules set by higher authorities in ________.

(Multiple Choice)
4.7/5
(35)

________ is a social engineering trick where an intruder may follow an authorized user through a door that the authorized user opens with an access device.

(Multiple Choice)
4.7/5
(33)

For watch lists of criminals, a false acceptance is worse than a false rejection from a security viewpoint.

(True/False)
4.9/5
(38)

Authentication is the process of collecting information about the activities of each individual in log files for immediate and later analysis.

(True/False)
4.9/5
(30)

Most users who have access to servers use reusable passwords for authentication.

(True/False)
4.7/5
(39)

It is illegal to go through a company's trash bins even if the trash bins are outside the corporation.

(True/False)
4.8/5
(39)

Verification is the process where the verifier determines the identity of the supplicant.

(True/False)
4.9/5
(37)

Microsoft domains can be organized into trees, and trees can be organized into forests.

(True/False)
4.8/5
(37)

A ________ is a small device that plugs into a standard computer port to identify the owner.

(Multiple Choice)
4.8/5
(42)

In directory servers, ________.

(Multiple Choice)
4.8/5
(34)

Authorizations are also called ________.

(Multiple Choice)
4.8/5
(37)

Passwords should be changed frequently.

(True/False)
4.8/5
(44)

Which of the following should be forbidden in secure areas?

(Multiple Choice)
4.8/5
(30)

________ can be used to supply power during long power outages.

(Multiple Choice)
4.9/5
(35)

________ is possible today.

(Multiple Choice)
4.8/5
(32)
Showing 21 - 40 of 124
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)