Formative 3 Flashcards
Which AAA component can be established using token cards?
accounting
authentication
auditing
authorization
Authentication
What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?
Local Security Policy tool
Computer Management
Activity Directory Security Tool
Event Viewer Security Log
Local Security Policy Tool
When a secuity audit is performed at a company, the audotir reports that new users have access to network resoruces beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occuring?
audit
network policy
password
least privilege
Least privilege
Because of implement security controls, a user can only access a server with FTP. Which AAA component accomplishes this?
authentication
authorization
auditing
accessibility
Authorization
Which access control model assigns security privileges based on the position, responsibilies, or job classification of an individual or group within an organization?
discretionary
role-based
mandatory
rule-based
Role-Based
Which component is a pillar of the zero trust security approach that focuses on the secure access of devices, such as servers, printers and other endpoints, including devices attached to IoT?
workloads
workplace
workflows
workforce
Workloads
What is used to scan a BYOD device to verify that it is compliant with company security plicies before the device is permitted to access the network?
NAC
ACL
proxy server
reconnaissance
Network Access Control (NAC)
An organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement?
technological
administrative
logical
physical
Administrative
After a security audit for an organization mutiple accounts were found to have privileged access to systems and device. Which three best practices for securing privileged accounts should be included in the audit report? (Choose three).
Secure password storage.
No one should have privileged access.
Only managers should have privileged access.
Enforce the principle of least privilege.
Only the CIO should have privileged access.
Reduce the number of privileged accounts.
Secure password storage.
Enforce the principle of least privilege.
Reduce the number of privileged accounts.
Which type of access control applies the strictest access control and is commonly used in military or mission critical applications?
Mandatory Access Control (MAC)
A user has been asked to implement IPsec for inboudn external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integiry and authenticity of the connection. What security tool can the user use?
SHA256
MD5
HMAC
ISAKMP
HMAC
What is the purpose of the network security accounting function?
to keep track of the actions of a user
to determine which resources a user can access
to provide challenge and response questions
to require users to prove who they are
To keep track of the actions of a user.
Which three processes are examples of logical access controls? (Choose three).
fences to protect the perimeter of a building
biometrics to validate physical characteristics
swipe cards to allow access to a restricted area
guards to monitor security screens
intrusion detection system (IDS) to watch for suspicious network activity
firewalls to monitor traffic
Intrusions detection system (IDS) to watch for suspicious network activity.
Firewalls to monitor traffic
Biometrics to validate physical characteristics.
Match the type of multifactor authentication with the description.
Something you know -
Something you have -
Something you are -
piece the correct answers:
a fingerprint scan
a password
a security key fob
Something you know - a password
Something you have - a security key fob
Something you are - a fingerprint scan