Security+ Chapter 11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of these is a set of permissions that is attached to an object?

A. Access control list (ACL)

What is the least restrictive access control model?

A. Discretionary Access Control (DAC)

With the development of IEEE 802.1x port security, the __________ authentication server has seen even greater usage.

A. RADIUS

A(n) ___________ is the person who is responsible for the information, determines the level of security needed for the data, and delegates security duties as required.

A. owner

How is the Security Assertion Markup Language (SAML) used?

B. It allows secure web domains to exchange user authentication and authorization data.

What is the current version of TACACS?

B. TACACS+

What is the name given to the individual who periodically reviews security settings and maintains records of access by users?

B. custodian

A user entering her user name would correspond to the __________ action in access control.

B. identification

Which of Microsoft Windows feature provides centralized management and configuration of computers and remote users who are using Active Directory?

C. Group Policy

__________ in access control means that if a condition is not explicitly met, then access is to be rejected.

C. Implicit deny

Which statements about Rule Based Access Control is true?

C. It dynamically assigns roles to subjects based on rules.

What is the version of the X.500 standard that runs on a personal computer over TCP/IP?

C. LDAP

A RADIUS authentication server requires that the __________ be authenticated first.

C. Supplicant

In the Mandatory Access Control (MAC) model, every subject and object ___________.

C. is assigned a label

The principle known as ___________ in access control means that each user should be given only the minimal amount of privileges necessary for that person to perform his job function.

C. least privilege

A process functioning on behalf of the user who attempts to access a file is known as a(n) __________.

C. subject

Which authentication protocol is available as a free download that runs on Microsoft Windows, Apple Mac OS X, and Linux?

D. Kerberos

A(n) ___________ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its contents.

D. LDAP injection attack

In the ___________ model, the end-user cannot change any security settings.

D. Mandatory Access Control

Which of these is NOT part of the makeup of the AAA elements in network security?

D. determining user need (analyzing)


Ensembles d'études connexes

MGMT 363: Exam 1 Connect Quizzes, 1-3

View Set

Service Technician Best Practices (RWSV210)

View Set

Penny's Exam Review Ch. 24, 25, 32

View Set

Chapter 15 - Water and Aqueous Systems

View Set

U.S. Government Securities Underwritings

View Set

GCA - Geometry A Introduction to Transformations

View Set

2016 Mock ACLAM Practice Written/Practical Examination

View Set

Unit 5: Quadratic Equations and Functions

View Set