Deck 11: Access-Identity
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/22
Play
Full screen (f)
Deck 11: Access-Identity
1
John wants to secure the FTP server access by allowing only authorized users access to it. What should he do?
A)Allow blind authentication.
B)Redirect FTP to a different port.
C)Change the port on which FTP works.
D)Disable anonymous logins.
A)Allow blind authentication.
B)Redirect FTP to a different port.
C)Change the port on which FTP works.
D)Disable anonymous logins.
Disable anonymous logins.
2
David is the Security Advisor at his organization. He is predicting a rapid growth in the number of systems connecting to the corporate network. Which of these should he implement to hide segments of the network from other segments and thereby control access to data on the network?
A)Security zone
B)VLAN
C)NAT
D)MAC
A)Security zone
B)VLAN
C)NAT
D)MAC
VLAN
3
Which of the following firewall strategies should you use to secure a firewall implementation?
A)Default Deny
B)Deny All
C)Permit All
D)Default Permit
A)Default Deny
B)Deny All
C)Permit All
D)Default Permit
Default Deny
4
John wants to hide his wireless network and protect it from unauthorized access. Which of the following should be used to prevent the network from being accessed in an unauthorized manner?
A)Use sniffer software.
B)Change the name of your wireless network.
C)Turn off the SSID broadcast.
D)Have a router password.
A)Use sniffer software.
B)Change the name of your wireless network.
C)Turn off the SSID broadcast.
D)Have a router password.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
5
Jack is fooled by a person who introduces himself as new IT staff in his organization. On the person's request, Jack reveals the web server login details. Later he finds out that the person was a fraud and confidential data has been stolen from the web server. What kind of attack has Jack encountered?
A)Man in the middle
B)Eavesdropping
C)Smurf
D)Social Engineering
A)Man in the middle
B)Eavesdropping
C)Smurf
D)Social Engineering
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is a common Logical Access Control method which restricts a user to access the system only during work hours?
A)Time-of-day restrictions
B)Token access
C)Work hour access
D)Password Policy
A)Time-of-day restrictions
B)Token access
C)Work hour access
D)Password Policy
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is the easiest way to restrict access to operating system components and resources in Windows?
A)Domain Password Policy
B)Group Policy
C)Password Policy
D)Time-of-day restrictions
A)Domain Password Policy
B)Group Policy
C)Password Policy
D)Time-of-day restrictions
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
8
What does the DAC access control model use to identify the users who have permissions to a resource?
A)Predefined access privileges
B)The role or responsibilities users have in the organization
C)Labels
D)Access Control Lists
A)Predefined access privileges
B)The role or responsibilities users have in the organization
C)Labels
D)Access Control Lists
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
9
What does the MAC access control model use to identify the users who have permission to access a resource?
A)The role or responsibilities users have in the organization
B)Labels
C)Access Control Lists
D)Predefined access privileges
A)The role or responsibilities users have in the organization
B)Labels
C)Access Control Lists
D)Predefined access privileges
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
10
Which of these biometric methods is considered the most accurate of the different biometric authentication types?
A)Iris scan
B)Retina scan
C)Facial geometry
D)Fingerprint scan
A)Iris scan
B)Retina scan
C)Facial geometry
D)Fingerprint scan
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
11
John is very concerned about storing his personal information in the right place. He wants to use a media format that is difficult to copy or counterfeit. Which of the following devices should he use?
A)CD-R
B)Tape
C)Flash card
D)Smart card
A)CD-R
B)Tape
C)Flash card
D)Smart card
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following aspects of a password security policy can most help you to decrease the probability that a password can be guessed?
A)Long password
B)Passwords with numbers, alphabets and special characters
C)Short password
D)Alphanumeric password
A)Long password
B)Passwords with numbers, alphabets and special characters
C)Short password
D)Alphanumeric password
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following password restrictions is not realistic in most network settings?
A)Passwords must be greater than eight characters and contain at least one numeric and one special character.
B)Passwords will expire at regular intervals.
C)User will be locked out of the account with a pre-specified number of failed attempts.
D)Passwords are randomly generated by the administrator and given to users.
A)Passwords must be greater than eight characters and contain at least one numeric and one special character.
B)Passwords will expire at regular intervals.
C)User will be locked out of the account with a pre-specified number of failed attempts.
D)Passwords are randomly generated by the administrator and given to users.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
14
In a Windows environment, which of the following conditions in the password policy defines the number of incorrect logon attempts permitted before the account is locked out?
A)Account lockout duration
B)Number of attempts
C)Password expiration
D)Account lockout threshold
A)Account lockout duration
B)Number of attempts
C)Password expiration
D)Account lockout threshold
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
15
What is it called when a security appliance detects an issue when there is no issue?
A)True Positive
B)True Negative
C)False Positive
D)False Negative
A)True Positive
B)True Negative
C)False Positive
D)False Negative
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
16
Which of these would be appropriate password behaviors for a user?
A)Post a sticky note with password under keyboard.
B)Give password to one other person in case they need access.
C)Not sharing password with anyone.
D)Saving all passwords in an unencrypted file on desktop.
A)Post a sticky note with password under keyboard.
B)Give password to one other person in case they need access.
C)Not sharing password with anyone.
D)Saving all passwords in an unencrypted file on desktop.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
17
What best describes a client/server protocol that allows remote servers to authenticate users by communicating with a central server to another server or service?
A)Kerberos
B)LDAP
C)RADIUS
D)XTACACS
A)Kerberos
B)LDAP
C)RADIUS
D)XTACACS
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
18
Single sign-on is beneficial because of all of the following except what?
A)Password fatigue becomes less of an issue
B)Allows users to save one password in cache, instead of many.
C)Reduces the amount of successful phishing attempts
D)Reduces the number of help desk calls.
A)Password fatigue becomes less of an issue
B)Allows users to save one password in cache, instead of many.
C)Reduces the amount of successful phishing attempts
D)Reduces the number of help desk calls.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
19
Giving someone the exact amount of access that they need to perform their job would be an example of:
A)Secure Logon
B)Free for all
C)User Rejection
D)Least Privilege
A)Secure Logon
B)Free for all
C)User Rejection
D)Least Privilege
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
20
Permissions that grant or deny a user access to specific operations on an object are called what?
A)ACL
B)SSH
C)DNS
D)DHCP
A)ACL
B)SSH
C)DNS
D)DHCP
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
21
Passwords become more secure with the following except for:
A)Added complexity of symbols, spaces and numbers.
B)Longer Length
C)Shorter Expiration
D)All lowercase letters
A)Added complexity of symbols, spaces and numbers.
B)Longer Length
C)Shorter Expiration
D)All lowercase letters
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
22
What does MAC filtering in a wireless network allow devices to do?
A)Trace where connection request come from.
B)Show who is on a network.
C)Allow or reject access based on the physical address.
D)Allow only certain devices to see the SSID.
A)Trace where connection request come from.
B)Show who is on a network.
C)Allow or reject access based on the physical address.
D)Allow only certain devices to see the SSID.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck