Lesson 8 - Questions Flashcards

1
Q

You are consulting with a company about a new approach to authenticating users. You suggest there could be cost savings and better support for multifactor authentication (MFA) if your employees create accounts with a cloud provider. That allows the company’s staff to focus on authorizations and privilege management. What type of service is the cloud vendor performing?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the process of ensuring accounts are only created for valid users, only assigned the appropriate privileges, and that the account credentials are known only to the valid user?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the policy that states users should be allocated the minimum sufficient permissions?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a SOP?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of organizational policies ensure that at least two people have oversight of a critical business process?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Recently, attackers were able to compromise the account of a user whose employment had been terminated a week earlier. They used this account to access a network share and delete important files. What account vulnerability enabled this attack?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

For what type of account would interactive logon be disabled?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What directory object would you use if you want to apply a different security policy to a subset of objects within the same domain?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why might forcing users to change their password every month be counterproductive?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the name of the policy that prevents users from choosing old passwords again?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In what two ways can an IP address be used for context-based authentication?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does accounting provide non-repudiation?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which information resource is required to complete usage auditing?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between locked and disabled accounts?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the advantages of a decentralized, discretionary access control policy over a mandatory access control policy?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between security group- and role-based permissions management?

A
17
Q

In a rule-based access control model, can a subject negotiate with the data owner for access privileges? Why or why not?

A
18
Q

What is the purpose of directory services?

A
19
Q

True or false? The following string is an example of a distinguished name: CN=ad, DC=classroom,DC=com

A
20
Q

You are working on a cloud application that allows users to log on with social media accounts over the web and from a mobile application. Which protocols would you consider and which would you choose as most suitable?

A
21
Q

Your company has been the victim of several successful phishing attempts over the past year. Attackers managed to steal credentials from these attacks and used them to compromise key systems. What vulnerability contributed to the success of these social engineers, and why?

A
22
Q

Why should an organization design role-based training programs?

A
23
Q

You are planning a security awareness program for a manufacturer. Is a pamphlet likely to be sufficient in terms of resources?

A