Exam 22: Privilege Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A file or resource owner has the ability to change the permissions on that file or resource.

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

B

Rights tend to be actions that deal with accessing the system itself,process control,and logging.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

True

Permissions are applied to users,not to groups.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

_______________ is the process of restricting a user's ability to interact with the computer system.

(Short Answer)
4.8/5
(26)

Your boss expressed concern about employees working on the network on weekends.She asks if there is something you can do to ensure that they do not have access.What would be the best way to accomplish this?

(Multiple Choice)
4.9/5
(33)

A(n)_______________ is the unique alphanumeric identifier used by a user when logging into or accessing a system.

(Short Answer)
4.9/5
(43)

A network administrator wants to specify the number of days a password must be used before it can be changed again.What domain password policy will need to be configured?

(Multiple Choice)
4.7/5
(37)

_______________ tells the system how many passwords to remember and does not allow a user to reuse an old password.

(Short Answer)
4.8/5
(39)

What are password and domain password policies?

(Essay)
5.0/5
(35)

The lowest level of classified information,which is defined as information that would "damage" national security,is known as "unclassified."

(True/False)
4.7/5
(41)

Windows operating systems use the concept of permissions AND rights to control access to files,folders,and information resources.

(True/False)
4.9/5
(30)

Groups are used to

(Multiple Choice)
4.8/5
(42)

Describe methods of account management (SSO,time of day,logical token,account expiration).

(Essay)
4.9/5
(33)

Minimum password age policy specifies the number of days a password may be used before it must be changed.

(True/False)
4.7/5
(35)

What is the process used to ensure that users have the correct rights to perform their jobs?

(Multiple Choice)
4.8/5
(25)

User account passwords can be set up to automatically expire.

(True/False)
4.8/5
(37)

_______________ control what the user is allowed to do with the objects on the system.

(Short Answer)
4.7/5
(38)

Assigning permissions to a collection of users based on some common criteria is called ____________.

(Short Answer)
4.8/5
(38)

Administrator,root,and superuser are accounts that have the power to do anything that can be done on a system.

(True/False)
4.9/5
(44)

Which of the following is the most effective password policy to enforce for system security?

(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 39
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)