Chapter 8 Cybersecurity
Immediately after successful authentication against an AAA data source
During the AAA process, when will authorization be implemented?
Remote access
The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy it this?
The use of UDP ports for authentication and accounting, Encryption of the password only
What are two characteristics of the RADIUS protocol? (Choose two.)
One safeguard failure does not affect the effectiveness of other safeguards
What is a characteristic of a layered defense-in-depth security approach?
Vulnerabilities in systems are exploited to grant higher levels of privilege than someone or some process should have
What is privilege escalation?
Accounting
Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?
Authorization
Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?
Department of Homeland Security
Which of the following offers a free service called Automated Indicator Sharing that enables the real-time exchange of cyberthreat indicators?
Company
Which type of business policy establishes the rules of conduct and responsibilities of employees and employers?
Authentication
Passwords, paraphrases, and PINs are examples of which security term?
Artichoke
With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?