Exam 11: Access Control Fundamentals
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as:
(Multiple Choice)
4.8/5
(32)
To prevent one individual from having too much control, employees can ____________ job responsibilities within their home department or across positions in other departments.
(Short Answer)
4.8/5
(34)
The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server.
(True/False)
4.9/5
(38)
A shield icon warns users if they attempt to access any feature that requires UAC permission.
(True/False)
4.8/5
(30)
The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following options?
(Multiple Choice)
4.9/5
(36)
What authentication service commonly used on UNIX devices involves communicating user authentication information to a centralized server?
(Multiple Choice)
4.8/5
(37)
The capability to look up information by name under the X.500 standard is known as a(n) ____________________-pages service.
(Short Answer)
4.7/5
(33)
Authorization and access are viewed as synonymous and in access control, they are the same step.
(True/False)
4.9/5
(31)
What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?
(Multiple Choice)
4.9/5
(35)
Matching
-The act of moving individuals from one job responsibility to another.
(Multiple Choice)
4.9/5
(36)
What access control model below is considered to be the most restrictive access control model, and involves assigning access controls to users strictly according to the custodian?
(Multiple Choice)
4.7/5
(39)
Matching
-The second version of the Terminal Access Control Access Control System (TACACS) authentication service.
(Multiple Choice)
4.8/5
(40)
Matching
-The least restrictive access control model in which the owner of the object has total control over it.
(Multiple Choice)
4.9/5
(32)
Matching
-The process of setting a user's account to expire
(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)