Exam 5: Access Control
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
If Directory Server A trusts Directory Server B, Directory Server B trusts Directory Server C, and Directory Server A trusts Directory Server C, this is ________ trust.
(Multiple Choice)
4.9/5
(32)
A false rejection occurs when a person is improperly matched to a template.
(True/False)
4.8/5
(46)
In Kerberos, the verifier is explicitly notified that the supplicant has been authenticated.
(True/False)
4.8/5
(24)
Which of the following are benefits of using identity management?
(Multiple Choice)
4.9/5
(36)
In high-risk environments, password reset risks are reduced by requiring the user's physical presence.
(True/False)
4.8/5
(33)
Directory servers from different vendors are synchronized through ________.
(Multiple Choice)
4.9/5
(28)
When an attacker deliberately attempts to fool the system, this is called ________.
(Multiple Choice)
4.9/5
(40)
________ often get their authentication information from ________.
(Multiple Choice)
4.9/5
(26)
If Directory Server A trusts Directory Server Band Directory Server B trusts Directory Server A, this is ________ trust.
(Multiple Choice)
4.9/5
(34)
The book recommends that passwords be at least ________ characters long.
(Multiple Choice)
4.7/5
(29)
________ servers synchronize directory servers from different vendors.
(Multiple Choice)
4.8/5
(39)
It is very important for testers to get permission before running a password cracking program on their company's computers to check for weak passwords even if such testing is in their job definitions.
(True/False)
4.7/5
(47)
Long passwords that use several types of keyboard characters are called ________ passwords.
(Multiple Choice)
4.8/5
(43)
When assigning initial permissions, it is good to give the least permissions believed to be necessary and then add permissions if appropriate.
(True/False)
4.8/5
(35)
If a firewall lacks the processing power to handle incoming traffic, it will drop any packets it cannot process. This is ________.
(Multiple Choice)
4.8/5
(35)
________ is the process of assessing the identity of each individual claiming to have permission to use a resource.
(Multiple Choice)
4.8/5
(34)
A ________ is a small device with a display that has a number that changes frequently.
(Multiple Choice)
5.0/5
(41)
Showing 61 - 80 of 124
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)