Exam 11: Access Control Fundamentals
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Select below the authentication system developed by the Massachusetts Institute of Technology (MIT) to verify the identity of network users:
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
B
Matching
-The current version of the Terminal Access Control Access Control System (TACACS) authentication service.
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
I
Matching
-Limitation imposed as to when a user can log in to a system or access resources.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
J
Group policy is a Unix feature that allows for the centralized management and configuration of computers and remote users using Unix Active Directory.
(True/False)
4.8/5
(34)
In the DAC model, ____________________ can create and access their objects freely.
(Short Answer)
4.8/5
(43)
Entries within a Directory Information Base are arranged in a tree structure called the:
(Multiple Choice)
4.8/5
(33)
____________________ is granting or denying approval to use specific resources.
a.Account expiration
b.Discretionary access control (DAC)
c.Extended TACACS (XTACACS)
d.Job rotation
e.LDAP injection attack
(Short Answer)
4.8/5
(26)
The Bell-LaPadula (BLP) model of MAC can be used to prevent subjects from creating a new object or performing specific functions on objects that are at a lower level than their own.
(True/False)
4.8/5
(41)
Which access control model can dynamically assign roles to subjects based on a set of defined rules?
(Multiple Choice)
4.9/5
(34)
When using Role Based Access Control (RBAC), permissions are assigned to:
(Multiple Choice)
4.9/5
(28)
Select below the access control model that uses access based on a user's job function within an organization:
(Multiple Choice)
5.0/5
(39)
User accounts that remain active after an employee has left an organization are referred to as being what type of accounts?
(Multiple Choice)
4.7/5
(29)
What is the name for a predefined framework that can be used for controlling access, and is embedded into software and hardware?
(Multiple Choice)
4.8/5
(31)
Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?
(Multiple Choice)
4.9/5
(37)
A user or a process functioning on behalf of the user that attempts to access an object is known as the:
(Multiple Choice)
4.9/5
(36)
Matching
-An attack that constructs LDAP statements based on user input statements, allowing the attacker to retrieve information from the LDAP database or modify its content.
(Multiple Choice)
4.9/5
(35)
List the steps for RADIUS authentication with a wireless device in an IEEE 802.1x network.
(Essay)
4.8/5
(34)
Matching
-Providing only the minimum amount of privileges necessary to perform a job or function.
(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)