Test 4 Flashcards
What is the current version of TACACS?
a. XTACACS
b. TACACS+
c. TACACS v9
d. TRACACS
b. TACACS+
How is the Security Assertion Markup Language (SAML) used?
It allows secure web domains to exchange user authentication and authorization data.
A RADIUS authentication server requires the ________ to be authenticated first.
d. supplicant (device/user seeking connection)
Which of the following is NOT true regarding how an enterprise should handle an orphaned or dormant account?
a. A formal procedure should be in place for disabling accounts for employees who are dismissed, resign, or retire from the organization.
b. Access should be ended as soon as the employee is no longer part of the organization.
c. Logs should be monitored because current employees are sometimes tempted to use an older dormant account instead of their own account.
d. All orphaned and dormant accounts should be deleted immediately whenever they are discovered.
d. All orphaned and dormant accounts should be deleted immediately whenever they are discovered.
With the development of IEEE 802.1x port security, what type of authentication server has seen even greater usage?
a. RADIUS
b. Lite RDAP
c. DAP
d. RDAP
a. RADIUS
Which of the following is NOT part of the AAA framework?
a. Authentication
b. Access
c. Authorization
d. Accounting
B. access
What is the version of the X.500 standard that runs on a personal computer over TCP/IP?
c. LDAP (Lightweight directory access protocol)
Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking?
Custodian
Which access control model is the most restrictive?
a. DAC
b. MAC
c. Role-Based Access Control
d. Rule-Based Access Control
b. MAC (creator and management)
DAC (allows an individual complete control over any objects they own along with the programs associated with those objects.)
Role-Based Access Control (Roles have certain permissions)
Rule-Based Access Control (Users given specific permissions)
Which type of access control model uses predefined rules that makes it flexible?
a. ABAC
b. DAC
c. MAC
d. Rule-Based Access Control
a. ABAC (attribute-based access control)
Which can be used to establish geographical boundaries where a mobile device can and cannot be used?
a. Location-based policies
b. Restricted access control policies
c. Geolocation policies
d. Mobile device policies
a. location-based policies
Which statement about Rule-Based Access Control is true?
a. It requires that a custodian set all rules.
b. It is considered obsolete today.
c. It dynamically assigns roles to subjects based on rules.
d. It is considered a real-world approach by linking a user’s job function with security.
c. It dynamically assigns roles to subjects based on rules.
Which of the following would NOT be considered as part of a clean desk policy?
a. Do not share passwords with other employees.
b. Lock computer workstations when leaving the office.
c. Place laptops in a locked filing cabinet.
d. Keep mass storage devices locked in a drawer when not in use.
a. do not share passwords with other employess
Which of these is a set of permissions that is attached to an object?
a. Access control list (ACL)
b. Subject Access Entity (SAE)
c. Object modifier
d. Security entry designator
a. Access control list (ACL)
Which Microsoft Windows feature provides group-based access control for centralized management and configuration of computers and remote users who are using Active Directory?
a. Windows Registry Settings
b. AD Management Services (ADMS)
c. Group Policy
d. Resource Allocation Entities
c. Group Policy
What can be used to provide both file system security and database security?
a. RBASEs
b. LDAPs
c. CHAPs
d. ACLs
d. ACLs (access-control lists)
What is the least restrictive access control model?
a. DAC
b. ABAC
c. MAC
d. Rule-Based Access Control
a. DAC
What is the secure version of LDAP?
a. LDAPS
b. Secure DAP
c. X.500
d. 802.1x
a. LDAPS
Which of the following is the Microsoft version of EAP?
a. EAP-MS
b. MS-CHAP
c. PAP-MICROSOFT
d. AD-EAP
b. MS-CHAP
EAS is used on encrypted networks to provide a secure way to send identifying information to provide network authentication
Which of the following involves rights given to access specific resources?
a. Identification
b. Access
c. Authorization
d. Accounting
b. access
At what point in a vulnerability assessment would an attack tree be utilized?
a. Vulnerability appraisal
b. Risk assessment
c. Risk mitigation
d. Threat evaluation
d. Threat evaluation
Atack trees are conceptual diagrams showing how an asset, or target, might be attacked.
Which of the following is NOT true about privacy?
a. Today, individuals can achieve any level of privacy that is desired.
b. Privacy is difficult due to the volume of data silently accumulated by technology.
c. Privacy is freedom from attention, observation, or interference based on your decision.
d. Privacy is the right to be left alone to the degree that you choose.
a. Today, individuals can achieve any level of privacy that is desired.
Which of the following is NOT true about privacy?
a. Today, individuals can achieve any level of privacy that is desired.
b. Privacy is difficult due to the volume of data silently accumulated by technology.
c. Privacy is freedom from attention, observation, or interference based on your decision.
d. Privacy is the right to be left alone to the degree that you choose.
a. Today, individuals can achieve any level of privacy that is desired.
Which of the following is NOT true about privacy?
a. Today, individuals can achieve any level of privacy that is desired.
b. Privacy is difficult due to the volume of data silently accumulated by technology.
c. Privacy is freedom from attention, observation, or interference based on your decision.
d. Privacy is the right to be left alone to the degree that you choose.
a. Today, individuals can achieve any level of privacy that is desired.
Which of the following is NOT a risk associated with the use of private data?
a. Individual inconveniences and identity theft
b. Associations with groups
c. Statistical inferences
d. Devices being infected with malware
d. Devices being infected with malware