Chapter 14 Flashcards
Configuring Authorization and Authentication
Digital certificates, smart cards, picture passwords, and biometrics are used to perform which of the following actions?
integrity
confidentiality
authorization
authentication
authentication
Generally speaking, which of the following password conditions is not considered to be part of a strong password for a corporation?
Is 12 characters long
Does not use part of the organization’s name
Does not use words found in the dictionary
Is also used for online accounts
Is also used for online accounts
A picture password is made up of which of the following components? (Choose all that apply)
A picture
A PIN
A password
A gesture
A picture
A gesture
Where are user accounts stored for computers that are in a workgroup?
Accounts Manager Datastore
Security Accounts Manager
Directory Information Tree
Local Security Authority
Security Accounts Manager
Workgroup computers use which authentication protocol when granting resource access?
Kerberos v5
SSL
NTLMv2
LSASS
NTLM v2
NTLM is used for systems running Windows NT 4.0 and earlier and for computers that are a member of a workgroup.
Which of the following basic security components is used to support virtual smart cards?
SSL certificates
Trusted Platform Module
Kerberos
NTFS
Trusted Platform Module
When visiting websites, users are automatically logged on. However, if other people use the same profile, a user might not want to automatically log on. Which of the following statements best describes how a user can delete the credentials used in the automatic logon?
Using Credential Manager
Using Credential Caching
Deleting the access token
Clearing the IE cache
Using Credential Manager
Which of the following is used to register a non-domain smartphone or tablet in Active Directory, which installs a certificate on a device so that it can secure single sign-on mechanism?
Device Registration Service
HomeGroup
Credential Caching
Credential Manager
Device Registration Service
Which term refers to a method used to provide proof that a security principal is the source of data, an action, or a communication?
Authorization
Integrity
Non-repudiation
Confidentiality
Non-repudiation
Nonrepudiation is a method used to provide proof that a security principal (user, computer, process) is the source of data, an action, or a communication. This is usually provided through the use of public key/private key technologies.
Which term refers to preventing people from reading information they are not authorized to read?
Authorization
Integrity
Non-repudiation
Confidentiality
Confidentiality