Exam C - review Flashcards

1
Q

A system administrator would like to prove an email message was sent by
a specific person. Which of the following describes the verification of this message source?

A

Non-repudiation
Non-repudiation is used to verify the source of data or a message. Digital
signatures are commonly used for non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following would be the MOST significant security concern
when protecting against organized crime?

A

Maintain reliable backup data
A common objective for organized crime is an organization’s data, and
attacks from organized crime can sometimes encrypt or delete data. A
good set of backups can often resolve these issues quickly and without any
ransomware payments to an organized crime syndicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

During an initial network connection, a supplicant communicates to an
authenticator, which then sends an authentication request to an Active
Directory database. Which of the following would BEST describe this
authentication technology?

A

802.1X
IEEE 802.1X is a standard for port-based network access control (NAC).
When 802.1X is enabled, devices connecting to the network do not
gain access until they provide the correct authentication credentials.
This 802.1X standard refers to the client as the supplicant, the switch
is commonly configured as the authenticator, and the back-end
authentication server is often a centralized user database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company’s employees are required to authenticate each time a file share,
printer, or SAN imaging system is accessed. Which of the following
should be used to minimize the number of employee authentication
requests?

A

SSO
SSO (Single Sign-On) accepts valid authentication requests and allows
users to access multiple resources without requiring additional user
authentications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company has recently moved from one accounting system to another,
and the new system includes integration with many other divisions of the organization. Which of the following would ensure that the correct access
has been provided to the proper employees in each division?

A

Internal self-assessment
An internal self-assessment with audit can verify users have the correct
permissions and all users meet the practice of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly