redo 12 Flashcards

1
Q

A scalable authentication architecture can be developed using

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Radius stands for

A

Remote Authentication Dial-in User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Under _____________________, Authentication, Authorization, and Accounting are performed by a separate server

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Terminal Access Controller Access Control System Plus (TACACS+)is a similar protocol to RADIUS but designed to be more

A

flexible and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where RADIUS is often used to authenticate connections by wireless and VPN users, TACACS+ is often used in authenticating administrative access to

A

routers and switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Most resources in a computer or network environment are protected from unauthorized use by an

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ACL is basically a list of subjects and the privileges they have on the

A

object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The following policies enforce the use of ACLs and ensure that they are effective

A

requireing passwords // change default admin user // change default user paswords // disable guest account // restricting user permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On a standalone workstation, password and account policies can be configured via the

A

Local Security Policy snap-in (secpol.msc) or the Group Policy snap-in (gpedit.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The simple means of doing this is to pressWindows + L

A

to lock the pc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

there are no restrictions on viewing the document.

A

unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

viewing is restricted to the owner organization or to third-parties under a Non-disclosure Agreement (NDA).

A

classfied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the information is highly sensitive, for viewing only by approved persons within the organization

A

confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the information is too valuable to permit any risk of its capture. Viewing is severely restricted.

A

secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this is the highest level of classification.

A

top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PII can include the following

A

names, date of birth, email address, telephone number, street address, biometric data, and so on.