Lesson 8 - Questions Flashcards
You are consulting with a company about a new approach to authenticating users. You suggest there could be cost savings and better support for multifactor authentication (MFA) if your employees create accounts with a cloud provider. That allows the company’s staff to focus on authorizations and privilege management. What type of service is the cloud vendor performing?
What is the process of ensuring accounts are only created for valid users, only assigned the appropriate privileges, and that the account credentials are known only to the valid user?
What is the policy that states users should be allocated the minimum sufficient permissions?
What is a SOP?
What type of organizational policies ensure that at least two people have oversight of a critical business process?
Recently, attackers were able to compromise the account of a user whose employment had been terminated a week earlier. They used this account to access a network share and delete important files. What account vulnerability enabled this attack?
For what type of account would interactive logon be disabled?
What directory object would you use if you want to apply a different security policy to a subset of objects within the same domain?
Why might forcing users to change their password every month be counterproductive?
What is the name of the policy that prevents users from choosing old passwords again?
In what two ways can an IP address be used for context-based authentication?
How does accounting provide non-repudiation?
Which information resource is required to complete usage auditing?
What is the difference between locked and disabled accounts?
What are the advantages of a decentralized, discretionary access control policy over a mandatory access control policy?