E10 - Database Security (WBT) Flashcards

(156 cards)

1
Q

True or false: Eloqua allows you to manage security settings at the database level for the whole organization.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When are security settings configured?

A

At the time of Eloqua installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you access security settings?

A

Settings: Setup: Administration: Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should you do before modifying security settings?

A

Consult Eloqua

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are your options for password requirements?

A

Use a pre-built password policy or create a new one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the default security complexity setting?

A

Eloqua Security Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can you change Password complexity settings if you are using the Eloqua Security Complexity setting?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When using Eloqua Security Complexity setting, the password values are _____ and hidden from view.

A

hard-coded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When using Eloqua Security Complexity setting, the password values are hard-coded and ____.

A

hidden from view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between Eloqua Security Complexity and Windows Security Complexity?

A

Windows Security Complexity is stricter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If changes are required to Eloqua Security Complexity or Windows Security Complexity, what must you use?

A

Custom Security Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When are the settings active under the Password complexity settings section?

A

Only if you have chosen Custom security complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What determines the password expiration timeframe?

A

User passwords expire in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the maximum and minimum values for password expiration?

A

365 days and 0 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the value for password expiration in Eloqua security complexity?

A

120 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the value for password expiration in Windows security complexity?

A

42 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the value for password expiration in Custom security complexity?

A

120 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If you set the value for password expiration to zero, what does this mean?

A

The password will never expire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What setting determines how long a user must wait before reusing a previous password?

A

Number of days in which a password cannot be reused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The value in the “Number of days in which a password cannot be reused” is also driven by the setting in the ___ field.

A

Enforce password history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the value for Number of days in which a password cannot be reused in the Eloqua security complexity?

A

0 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the value for Number of days in which a password cannot be reused in the Windows security complexity?

A

2 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the value for Number of days in which a password cannot be reused in the Custom security complexity?

A

0 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What setting determines the number of unique new passwords that must be associated with a user account before an old password can be reused?

A

Enforce password history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
To maintain the effectiveness of the password history, what should you do?
Do not allow passwords to be changed right after they were changed.
26
How do you prevent passwords from being changed after they were just changed?
By setting the Number of days in which a password cannot be reused security policy setting to 1.
27
What setting determines the minimum characters in the password?
Minimum password length.
28
What is the minimum value for password length?
5
29
What is the minimum password length for Eloqua security complexity?
6 characters
30
What is the minimum password length for Windows security complexity?
8 characters
31
What is the minimum password length for Custom security complexity?
5 characters
32
True or false: "Require at least one uppercase character" is enabled for all complexity levels.
True
33
True or false: "Require at least one lowercase character" is enabled for all complexity levels.
True
34
"Require at least one digit" is enabled for which complexity levels?
All
35
True or false: "Require at least one punctuation character" is enabled by default for all complexity levels.
False. It is disabled by default for all complexity levels.
36
"Password cannot contain more than 2 characters from the user name" - enabled or disabled for Eloqua security complexity?
Disabled
37
"Password cannot contain more than 2 characters from the user name" - enabled or disabled for Windows security complexity?
Enabled
38
"Password cannot contain more than 2 characters from the user name" - enabled or disabled for Custom security complexity?
Enabled
39
"Password cannot contain user's account name" - enabled or disabled for Eloqua security complexity?
Disabled
40
"Password cannot contain user's account name" - enabled or disabled for Windows security complexity?
Enabled
41
"Password cannot contain user's account name" - enabled or disabled for Custom security complexity?
Enabled
42
"Require the first character to be alphanumeric" mandates that the first character of a user's password must be ____ and cannot be a ___
alphanumeric and cannot be a special or Unicode character.
43
True or false: "Require the first character to be alphanumeric" is enabled for all complexity levels.
False - it is disabled
44
True or false: "Require the first character to be alphanumeric" is disabled by default for all complexity levels.
True
45
True or false: Eloqua offers a "Restrict login by IP address" option.
True
46
True or false: Eloqua provides you with options for configuring "Restrict Login By IP"
True.
47
What are the three options for configuring "Restrict Login by IP Address"?
By IP Range, Specific IP Block, By Network Mask.
48
What kind of environments would you be most likely to restrict login by IP address to a specific IP block?
Where IP addresses are not dynamically assigned.
49
How do you enter the "By Network Mask" option?
Enter the beginning IP address of the IP range you wish to add, followed by the network mask in slash notation.
50
Use the ____ section to define the timeframe and number of attempts after which a user must have their password reset.
Account Lockout Policy.
51
The Account Lockout Policy contains settings for: ____, Lockout effective period, Reset invalid login count after...
Maximum invalid login attempts
52
The default value for Maximum invalid login attempts is:
10
53
The default value for Lockout effective period is
5 minutes
54
If you set Lockout effective period to 0, what happens?
Account will be locked until an admin manually unlocks it.
55
The __ setting determines the number of minutes that must pass before the lockout threshold is reset.
Reset invalid login count after...
56
If Reset invalid login count after... is set to zero, what happens?
An admin must manually reset the account.
57
The Account Lockout Policy contains settings for: Maximum invalid login attempts, _____, Reset invalid login count after...
Lockout effective period
58
The Account Lockout Policy contains settings for: Maximum invalid login attempts, Lockout effective period, ______
Reset invalid login count after...
59
______ determines the duration after which a current session will expire in case of abandonment.
Session timeout value in minutes
60
The ____ includes Session Timeout value and Forgotten password reset time
Session Timeout Policy.
61
What is the default Session Timeout value?
120 minutes
62
The ___ determines the duration after which a user can get a new Forgot Password email.
Forgot password reset time
63
The default value for the Forgot password reset time in minutes is...
720 minutes (12 hours)
64
___ allows users to log into one product to access all their services.
SSO - Single Sign-on
65
Benefits of SSO: (1) ____ (2) productivity (3) easy policy implementation (4) reduced admin overhead
security
66
Benefits of SSO: (1) security (2) ____ (3) easy policy implementation (4) reduced admin overhead
productivity
67
Benefits of SSO: (1) security (2) productivity (3) ____ (4) reduced admin overhead
easy policy implementation
68
Benefits of SSO: (1) security (2) productivity (3) easy policy implementation (4) ____
reduced admin overhead
69
Why does SSO provide additional security?
Users will create a stronger password
70
3 steps to configuring SSO, in short
(1) Upload Metadata (2) Map the usernames (3) Download the Certificate
71
To access the SSO configuration page
Settings: Setup: Administration: Users
72
To upload Identity Provider Metadata
Single Sign-On down arrow: Identify Provider Settings
73
Where do you find the ACS and the Service Provider Entity URL?
On the Identity Provider Details page.
74
You will need the ACS and the Service Provider Entity URL when you...
Configure the SSO product
75
To map the usernames...
Identity Provider Details screen: Edit
76
What should you type in the "The name of the attribute that contains the user identity" field?
email
77
In mapping the usernames, under ____, select "The user identity is located in an assertion attribute value"
User Identity Location
78
Where do you download the certificate?
Single Sign-On down arrow: Certificate Setup
79
When you download the certificate, you should save it...
locally.
80
When a contact is uploaded to Eloqua, who has access to the contact?
All users.
81
3 examples of needing to control user access to contacts:
(1) Restricting access by business division or geography (3) Restricted access for Sales (4) Sharing access by business division or geography
82
__ indicate how you separate access to contacts
Categories
83
To restrict access based on Business Division and Geography, create what categories?
Business Division and Geography
84
Labels reside inside ___
categories
85
__ indicate the subdivisions under each category.
Labels
86
An example of labels is to create APAC, EMEA, and AMER labels under the _____
Region category.
87
The second step in Contact Security is to create __
security groups
88
You need to create ____ corresponding to each label to define the users that will have access to various contacts.
security groups
89
The third step in Contact Security is to map ____ to __
map security groups to labels
90
The fourth step in Contact Security is to assign ___ to __
assign labels to contacts.
91
To assign labels to contacts, you need to create a ___ that will evaluate the information in the Contact Records and assign a label.
program
92
If no label is assigned to a Contact Record, what happens?
The record will be available to all users.
93
What happens if a user is in multiple access security groups?
Then the user will be able to see all contacts for each security group.
94
What is recommended when configuring contact security?
Work with an Eloqua representative
95
where to find categories and labels?
Settings: Setup: Administration: Users: Contact Security down arrow: Manage Labels
96
The __ page is where you define categories and labels
Manage Labels
97
3 options to create security groups
(1) new (2) copy and repurpose (3) use out-of-the-box
98
The _____ security group does not have any actions or interface permissions.
standard Everyone
99
The ____ security group is strictly used for determining a user's __
contact access - not feature or function access.
100
True or false: You create a name and an acronym for security groups.
True.
101
The last step in creating security groups is...
add users to each security group.
102
Where do you assign labels?
Contact Security drop-down: Assign Labels
103
The program to examine Contact Records and assign labels is created using the _____ or _____ model.
shared or unique model
104
In the program to assign labels, what type of action should you choose for "Remove Labels"?
Ownership
105
7 types of actions under Program Builder are (1) ___ (2) Data Tools (3) Groups (4) Integration (5) Marketing Actions (6) Ownership (7) Program Maintenance
All
106
7 types of actions under Program Builder are (1) all (2) ___ (3) Groups (4) Integration (5) Marketing Actions (6) Ownership (7) Program Maintenance
Data Tools
107
7 types of actions under Program Builder are (1) all (2) Data Tools (3) _____ (4) Integration (5) Marketing Actions (6) Ownership (7) Program Maintenance
Groups
108
7 types of actions under Program Builder are (1) all (2) Data Tools (3) Groups (4) ____ (5) Marketing Actions (6) Ownership (7) Program Maintenance
Integration
109
7 types of actions under Program Builder are (1) all (2) Data Tools (3) Groups (4) Integration (5) _____ (6) Ownership (7) Program Maintenance
Marketing Actions
110
7 types of actions under Program Builder are (1) all (2) Data Tools (3) Groups (4) Integration (5) Marketing Actions (6) ___ (7) Program Maintenance
Ownership
111
7 types of actions under Program Builder are (1) all (2) Data Tools (3) Groups (4) Integration (5) Marketing Actions (6) Ownership (7) ____
Program Maintenance
112
What Action do you enter in Program Builder to remove labels?
Remove Contact Security Labels
113
How can you open a menu for editing decision steps?
Click the down arrow on the decision step.
114
In Program Builder, can you restrict the time actions run?
Yes.
115
True or false: you can allow Custom Objects in a program step.
True.
116
Because a contact will always remain in one geographic region, use the ____ Model to create a program to assign labels to contact records.
Unique
117
True or false: You can configure asset-level security in Eloqua.
True
118
____ allow you to control levels of access to assets, features, and interfaces.
Security groups
119
Access security groups from the User Management page:
Groups: All Groups ... displays Security Group Overview interface
120
Security Group overview: The ____ section allows you to define the products that users in the group can access
Licensing
121
Access to use the core platform requires the __ license.
Eloqua Marketing Platform
122
The ___ section controls the features and areas of the application that are visible to users in this group.
Interface Access
123
The Interface Access tree is organized...
in a hierarchy that matches the hierarchy of how you navigate the platform.
124
In Interface Access, if you are looking at a new security group or the Everyone security group, what is true?
No areas of the application are selected.
125
In Interface Access, there are default selections made for the ____ or _____ security groups.
System or Default
126
True or false: Access to assets set in Interface Access allow users to create, modify or delete the assets.
False. This is set in the Asset Creation section.
127
The ____ section of security group overview controls the actions that can be performed on a particular interface by users in this group.
Action Permissions section
128
The Action Permissions section is closely linked with the ____ section of the Security Group overview.
Interface Access
129
Security Group Overview 6 sections: (1) _____ (2) Interface Access (3) Action Permissions (4) Asset Creation (5) Default Asset Permissions (6) Business Unit Membership
Licensing
130
Security Group Overview 6 sections: (1) Licensing (2) ____ (3) Action Permissions (4) Asset Creation (5) Default Asset Permissions (6) Business Unit Membership
Interface Access
131
Security Group Overview 6 sections: (1) Licensing (2) Interface Access (3) _____ (4) Asset Creation (5) Default Asset Permissions (6) Business Unit Membership
Action Permissions
132
Security Group Overview 6 sections: (1) Licensing (2) Interface Access (3) Action Permissions (4) _____ (5) Default Asset Permissions (6) Business Unit Membership
Asset Creation
133
Security Group Overview 6 sections: (1) Licensing (2) Interface Access (3) Action Permissions (4) Asset Creation (5) ______ (6) Business Unit Membership
Default Asset Permissions
134
Security Group Overview 6 sections: (1) Licensing (2) Interface Access (3) Action Permissions (4) Asset Creation (5) Default Asset Permissions (6) _____
Business Unit Membership
135
The __ section of the Security Group Overview controls the actions that can be performed on a particular interface by users in this group.
Action Permissions
136
The _____ section identifies the types of assets that users of this group have the ability to create.
Asset Creation
137
The _____ section controls the default permissions applied to an asset.
Default Asset Permissions
138
If you want to only allow the user who created an asset to edit or delete it, what section of the Security Group Overview would you use?
Default Asset Permissions
139
The ____ section of the Security Group Overview can select which business unit users will be members of.
Business Unit Membership
140
The Business Unit Membership is only applicable if...
Categories have been configured for business units.
141
When a user creates a new asset, there are a default set of permissions on that asset. True or false?
True.
142
What are the four levels of security that users or security groups can have over an asset?
View, Edit, Delete, Security
143
In the ____ level of asset permissions, users can change the asset permissions.
Security
144
From the Security Group Overview, where do you assign permissions?
Click Default Asset Permissions, and click edit.
145
The __ allows you to secure the entire email template so it cannot be modified, or only mark certain sections as edited.
Email Template Manager
146
Where is email template manager:
Assets: Emails: Template Manager icon
147
Create an email template as you would create...
any email.
148
After saving as a template, what do you do to mark some of the template as protected?
Gear menu: Enable Protected Mode
149
How do you mark some sections as editable?
Right-click on the component and select Mark as Editable.
150
True or false: When you mark a component as editable you can allow it to be deleted.
True.
151
How are editable sections marked in a template?
With a blue line around them.
152
What feature of the Email Template allows you to lock an entire email asset or mark certain sections as editable?
Protected Mode
153
Configuring __ security insures information confidentiality and system integrity.
User Security
154
Configuring __ leads to effective resource utilization.
SSO
155
Configuring ____ allows you to implement cost effective guardrails to prevent against unauthorized access and disclosure.
Contact Security
156
Configuring ___ allows you to define permissions for each asset type against unauthorized deletion or modification.
Asset Security