Chapter 14 Flashcards

Configuring Authorization and Authentication

1
Q

Digital certificates, smart cards, picture passwords, and biometrics are used to perform which of the following actions?

integrity

confidentiality

authorization

authentication

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Generally speaking, which of the following password conditions is not considered to be part of a strong password for a corporation?

Is 12 characters long

Does not use part of the organization’s name

Does not use words found in the dictionary

Is also used for online accounts

A

Is also used for online accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A picture password is made up of which of the following components? (Choose all that apply)

A picture

A PIN

A password

A gesture

A

A picture

A gesture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are user accounts stored for computers that are in a workgroup?

Accounts Manager Datastore

Security Accounts Manager

Directory Information Tree

Local Security Authority

A

Security Accounts Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Workgroup computers use which authentication protocol when granting resource access?

Kerberos v5

SSL

NTLMv2

LSASS

A

NTLM v2

NTLM is used for systems running Windows NT 4.0 and earlier and for computers that are a member of a workgroup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following basic security components is used to support virtual smart cards?

SSL certificates

Trusted Platform Module

Kerberos

NTFS

A

Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When visiting websites, users are automatically logged on. However, if other people use the same profile, a user might not want to automatically log on. Which of the following statements best describes how a user can delete the credentials used in the automatic logon?

Using Credential Manager

Using Credential Caching

Deleting the access token

Clearing the IE cache

A

Using Credential Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is used to register a non-domain smartphone or tablet in Active Directory, which installs a certificate on a device so that it can secure single sign-on mechanism?

Device Registration Service

HomeGroup

Credential Caching

Credential Manager

A

Device Registration Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which term refers to a method used to provide proof that a security principal is the source of data, an action, or a communication?

Authorization

Integrity

Non-repudiation

Confidentiality

A

Non-repudiation

Nonrepudiation is a method used to provide proof that a security principal (user, computer, process) is the source of data, an action, or a communication. This is usually provided through the use of public key/private key technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which term refers to preventing people from reading information they are not authorized to read?

Authorization

Integrity

Non-repudiation

Confidentiality

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly