Formative 3 Flashcards

1
Q

Which AAA component can be established using token cards?

accounting

authentication

auditing

authorization

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?

Local Security Policy tool

Computer Management

Activity Directory Security Tool

Event Viewer Security Log

A

Local Security Policy Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a secuity audit is performed at a company, the audotir reports that new users have access to network resoruces beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occuring?

audit

network policy

password

least privilege

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Because of implement security controls, a user can only access a server with FTP. Which AAA component accomplishes this?

authentication

authorization

auditing

accessibility

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which access control model assigns security privileges based on the position, responsibilies, or job classification of an individual or group within an organization?

discretionary

role-based

mandatory

rule-based

A

Role-Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which component is a pillar of the zero trust security approach that focuses on the secure access of devices, such as servers, printers and other endpoints, including devices attached to IoT?

workloads

workplace

workflows

workforce

A

Workloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is used to scan a BYOD device to verify that it is compliant with company security plicies before the device is permitted to access the network?

NAC

ACL

proxy server

reconnaissance

A

Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement?

technological

administrative

logical

physical

A

Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

After a security audit for an organization mutiple accounts were found to have privileged access to systems and device. Which three best practices for securing privileged accounts should be included in the audit report? (Choose three).

Secure password storage.

No one should have privileged access.

Only managers should have privileged access.

Enforce the principle of least privilege.

Only the CIO should have privileged access.

Reduce the number of privileged accounts.

A

Secure password storage.

Enforce the principle of least privilege.

Reduce the number of privileged accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of access control applies the strictest access control and is commonly used in military or mission critical applications?

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user has been asked to implement IPsec for inboudn external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integiry and authenticity of the connection. What security tool can the user use?

SHA256

MD5

HMAC

ISAKMP

A

HMAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the network security accounting function?

to keep track of the actions of a user

to determine which resources a user can access

to provide challenge and response questions

to require users to prove who they are

A

To keep track of the actions of a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which three processes are examples of logical access controls? (Choose three).

fences to protect the perimeter of a building

biometrics to validate physical characteristics

swipe cards to allow access to a restricted area

guards to monitor security screens

intrusion detection system (IDS) to watch for suspicious network activity

firewalls to monitor traffic

A

Intrusions detection system (IDS) to watch for suspicious network activity.

Firewalls to monitor traffic

Biometrics to validate physical characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Match the type of multifactor authentication with the description.

Something you know -

Something you have -

Something you are -

piece the correct answers:

a fingerprint scan
a password
a security key fob

A

Something you know - a password

Something you have - a security key fob

Something you are - a fingerprint scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly