Exam 22: Privilege Management
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
A file or resource owner has the ability to change the permissions on that file or resource.
Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
B
Rights tend to be actions that deal with accessing the system itself,process control,and logging.
Free
(True/False)
4.9/5
(38)
Correct Answer:
True
Permissions are applied to users,not to groups.
Free
(True/False)
4.8/5
(34)
Correct Answer:
False
_______________ is the process of restricting a user's ability to interact with the computer system.
(Short Answer)
4.8/5
(26)
Your boss expressed concern about employees working on the network on weekends.She asks if there is something you can do to ensure that they do not have access.What would be the best way to accomplish this?
(Multiple Choice)
4.9/5
(33)
A(n)_______________ is the unique alphanumeric identifier used by a user when logging into or accessing a system.
(Short Answer)
4.9/5
(43)
A network administrator wants to specify the number of days a password must be used before it can be changed again.What domain password policy will need to be configured?
(Multiple Choice)
4.7/5
(37)
_______________ tells the system how many passwords to remember and does not allow a user to reuse an old password.
(Short Answer)
4.8/5
(39)
The lowest level of classified information,which is defined as information that would "damage" national security,is known as "unclassified."
(True/False)
4.7/5
(41)
Windows operating systems use the concept of permissions AND rights to control access to files,folders,and information resources.
(True/False)
4.9/5
(30)
Describe methods of account management (SSO,time of day,logical token,account expiration).
(Essay)
4.9/5
(33)
Minimum password age policy specifies the number of days a password may be used before it must be changed.
(True/False)
4.7/5
(35)
What is the process used to ensure that users have the correct rights to perform their jobs?
(Multiple Choice)
4.8/5
(25)
_______________ control what the user is allowed to do with the objects on the system.
(Short Answer)
4.7/5
(38)
Assigning permissions to a collection of users based on some common criteria is called ____________.
(Short Answer)
4.8/5
(38)
Administrator,root,and superuser are accounts that have the power to do anything that can be done on a system.
(True/False)
4.9/5
(44)
Which of the following is the most effective password policy to enforce for system security?
(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 39
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)