Exam 3: Authenticating Users
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Describe mandatory access control.
Free
(Essay)
4.8/5
(41)
Correct Answer:
Mandatory Access Control (MAC) is a requirement in some settings.When used, it is structured and coordinated with both a data classification scheme and a personnel clearance scheme.Users and data owners have little or no control over access to the information resources being controlled by the MAC environment.A MAC will use a data classification scheme that assigns each collection or type of information to a sensitivity level.Each user is also rated with a sensitivity level called a clearance that will specify the level of information he or she may access.
RADIUS works with Network Address Translation (NAT).
Free
(True/False)
4.8/5
(39)
Correct Answer:
False
____ reduces the chance of an individual violating information security by increasing the scrutiny on any one user.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
D
Match each item with a statement below.
-Determined by a central authority in the organization.
(Multiple Choice)
4.9/5
(37)
Physical attributes are an example of something you ____ that can be used to verify identity.
(Multiple Choice)
4.9/5
(43)
Match each item with a statement below.
-Confirming the identity of the entity seeking access to a logical or physical area
(Multiple Choice)
4.8/5
(39)
Match each item with a statement below.
-Obtaining the identity of the entity requesting access to a logical or physical area.
(Multiple Choice)
4.8/5
(41)
You might have to use TACACS+ or ____ if your firewall doesn't support authentication.
(Multiple Choice)
4.9/5
(29)
____________________ IP address mappings work best because some TACACS+ systems use the source IP address to create the encryption key.
(Short Answer)
4.7/5
(45)
____ authentication can enable employees who work remotely or who are traveling to access your internal servers.
(Multiple Choice)
4.8/5
(26)
Match each item with a statement below.
-Principle by which employees are provided access to the minimal amount of information for the least duration of time necessary to perform their duties
(Multiple Choice)
4.9/5
(34)
The ____ authentication server is also known as a Key Distribution Center (KDC).
(Multiple Choice)
4.7/5
(30)
____ access controls remedy a circumstance or mitigate the damage caused during an incident.
(Multiple Choice)
4.8/5
(39)
Client authentication or ____ authentication should be used when only a single user is coming from a single IP address.
(Multiple Choice)
4.9/5
(28)
____ is most frequently associated with data classification schemes.
(Multiple Choice)
4.8/5
(21)
In ____________________-based access controls, access is granted based on a set of rules specified by the central authority.
(Short Answer)
4.8/5
(31)
Match each item with a statement below.
-Documenting the activities of the authorized individual and systems.
(Multiple Choice)
4.7/5
(35)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)