Exam 3: Authenticating Users
Exam 1: Introduction to Information Security50 Questions
Exam 2: Security Policies and Standards50 Questions
Exam 3: Authenticating Users50 Questions
Exam 4: Introduction to Firewalls49 Questions
Exam 5: Packet Filtering50 Questions
Exam 6: Firewall Configuration and Administration50 Questions
Exam 7: Working With Proxy Servers and Application-Level Firewalls50 Questions
Exam 8: Implementing the Bastion Host49 Questions
Exam 9: Encryption - The Foundation for the Virtual Private Network48 Questions
Exam 10: Setting up a Virtual Private Network50 Questions
Select questions type
Some firewalls use authentication to give employees access to common resources.
(True/False)
4.7/5
(29)
The ____________________ password system, which is a feature of the Linux operating system that enables the secure storage of passwords, stores them in another file that has restricted access.
(Short Answer)
4.8/5
(33)
Match each item with a statement below.
-Implemented at the discretion of the data user.
(Multiple Choice)
4.9/5
(35)
Linux stores passwords in the ____ file in encrypted format.
(Multiple Choice)
4.9/5
(33)
____________________ is the act of confirming the identity of a potential user.
(Short Answer)
4.8/5
(36)
For most information, the U.S.military uses a classification scheme with ____ as the uppermost tier.
(Multiple Choice)
4.8/5
(32)
A simple scheme can allow an organization to protect sensitive information, such as marketing or research data, personnel data, customer data, and general internal communications classifies data.Which of the following categories would most likely be used for internal phone lists?
(Multiple Choice)
4.8/5
(21)
To configure client authentication, you need to set up one of two types of authentication systems: ____ and ____.
(Multiple Choice)
4.7/5
(25)
Public-Key Infrastructure (PKI) must be used for ____ authentication.
(Multiple Choice)
4.8/5
(31)
Match each item with a statement below.
-Determining which actions an entity can perform in that physical or logical area.
(Multiple Choice)
4.8/5
(32)
Describe the differences between local and centralized authentication.
(Essay)
4.9/5
(40)
Lattice-based access control is a variation of ____ access control.
(Multiple Choice)
4.9/5
(36)
Most organizations do not need the detailed level of classification used by the military or federal agencies.
(True/False)
4.8/5
(27)
IEEE 802.1x is one of the fastest growing standards being used in enterprise networks today.
(True/False)
4.9/5
(39)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)