Chapter 12

11 September 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
MS-CHAP
answer
Which of the following is the Microsoft version of CHAP? MS-CHAP AD-EAP EAP-MS PAP-MICROSOFT
question
MAC
answer
Which access control model is the most restrictive? DAC MAC Role-Based Access Control Rule-Based Access Control
question
ACLs
answer
What can be used to provide both file system security and database security? RBASEs CHAPs LDAPs ACLs
question
All orphaned and dormant accounts should be deleted immediately whenever they are discovered.
answer
Which of the following is NOT true regarding how an enterprise should handle an orphaned or a dormant account? A formal procedure should be in place for disabling accounts for employees who are dismissed, resign, or retire from the organization. Access should be ended as soon as the employee is no longer part of the organization. Logs should be monitored because current employees are sometimes tempted to use an older dormant account instead of their own account. All orphaned and dormant accounts should be deleted immediately whenever they are discovered.
question
Access
answer
Which of the following is NOT part of the AAA framework? Access Authentication Authorization Accounting
question
LDAPS
answer
What is the secure version of LDAP? Secure DAP 802.1x LDAPS X.500
question
Custodian
answer
Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking? Operator Custodian Privacy officer End-user
question
Location-based policies
answer
Which can be used to establish geographical boundaries where a mobile device can and cannot be used? Geolocation policies Location-based policies Mobile device policies Restricted access control policies
question
supplication
answer
A RADIUS authentication server requires the ________ to be authenticated first. authenticator authentication server user supplicant
question
Access
answer
Which of the following involves rights given to access specific resources? Authorization Access Accounting Identification
question
ABAC
answer
Which type of access control model uses predefined rules that makes it flexible? MAC ABAC DAC Rule-Based Access Control
question
It allows secure web domains to exchange user authentication and authorization data.
answer
How is the Security Assertion Markup Language (SAML) used? It allows secure web domains to exchange user authentication and authorization data. It is an authenticator in IEEE 802.1x. It is no longer used because it has been replaced by LDAP. It is a backup to a RADIUS server.
question
DAC
answer
What is the least restrictive access control model? MAC Rule-Based Access Control DAC ABAC
question
LDAP
answer
What is the version of the X.500 standard that runs on a personal computer over TCP/IP? LDAP Lite RDAP IEEE X.501 DAP
question
Do not share passwords with other employees
answer
Which of the following would NOT be considered as part of a clean desk policy? Do not share passwords with other employees. Place laptops in a locked filing cabinet. Keep mass storage devices locked in a drawer when not in use. Lock computer workstations when leaving the office.
question
Group Policy
answer
Which Microsoft Windows feature provides group-based access control for centralized management and configuration of computers and remote users who are using Active Directory? Windows Registry Settings Resource Allocation Entities Group Policy AD Management Services (ADMS)
question
RADIUS
answer
With the development of IEEE 802.1x port security, what type of authentication server has seen even greater usage? Lite RDAP RDAP RADIUS DAP
question
Access control list (ACL)
answer
Which of these is a set of permissions that is attached to an object? Subject Access Entity (SAE) Access control list (ACL) Object modifier Security entry designator
question
TACACS+
answer
What is the current version of TACACS? TACACS+ TRACACS TACACS v9 XTACACS
question
It dynamically assigns roles to subjects based on rules.
answer
Which statement about Rule-Based Access Control is true? It is considered a real-world approach by linking a user's job function with security. It requires that a custodian set all rules. It dynamically assigns roles to subjects based on rules. It is considered obsolete today.