redo 13 Flashcards

1
Q

is a security setting that determines the level of access a user or group account has to a particular resource

A

permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Permissions can be associated with a variety of resources, such as

A

files, printers, shared folders, and network directory databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Permissions can typically be configured to allow different levels of privileges, or to

A

deny privileges to users who should not access a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A permission is usually implemented as an_______________________________attached to each resource.

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ACL contains a number of________________________________________ which are records of subjects and the permissions they hold on the resource.

A

Access control entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

File-system permissions enforced by NTFS allow the object owner to set access control to individual

A

files and folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

File-level permissions will prevent any unauthorized access to a file or folder both across the network and locally by prompting all users, including the user who created the file, to enter the ______________________________________________.

A

correct user name and password for access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Share-level permissions only apply when a folder is accessed over a ____________________

A

network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The___________________________feature of NTFS supports file and folder encryption

A

encryption file system EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Without strong authentication, encrypted data is only as secure as the

A

user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An alternative to file encryption is to use a_______________________product such as bitlocker

A

full device encryption FDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____________________disk encryption product is built into the Enterprise editions of Windows

A

bitlocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Disk encryption also encrypts the swap file, __________________________.

A

print queues, temporary files, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Some disk encryption products, including BitLocker, can make use of a _____________________________ chip in the computer to tie use of a hard disk to a particular motherboard

A

Trusted Platform Module TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The TPM is used as a secure means of storing the encryption key and to ensure the integrity of the

A

OS used to boot the machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly