Cyber Sec 2 ch 4 test study guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In the /etc/shadow file, which character in the password field indicates that a standard user account is locked?

!

Which of the following chage option keeps a user from changing their password every two weeks?

-m 33

Using the groupadd -p command overrides the settings found in which file?

/etc/login.defs

Which of the following ports are used with TACACS?

49

Which of the following BEST describes the domain controller component of Active Directory?

A domain controller is a server that holds a copy of the Active Directory database that can be written to and is responsible for copying changes to Active Directory between the domain controllers.

What is mutual authentication?

A process by which each party in an online communication verifies the identity of the other party.

Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?

Access token

Match each smart card attack on the left with the appropriate description on the right. Microprobing

Accesses the chip's surface directly to observe, manipulate, and interfere with a circuit.

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information?

Active Directory

Which access control model is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject?

Attribute-based access control (ABAC)

RADIUS is primarily used for what purpose?

Authenticating remote clients before access to the network is granted

What is the process of controlling access to resources such as computers, files, or printers called?

Authorization

You are a cybersecurity expert implementing a zero trust model in a large organization. You are tasked with designing the control and data planes. Which of the following strategies should you prioritize and why?

Balance your focus between the control and data planes, ensuring both are optimized for security and efficiency.

John, a security analyst, is using a smart card to gain access to a secure server room. He simply waves his card near the card reader and the door unlocks. Later, he uses the same card to log into his computer by inserting it into a card reader. Based on this information, is John using a contact or contactless smart card?

Both a contact and contactless smart card, because he used the card both by inserting it into a reader and by waving it near a reader.

Match each smart card attack on the left with the appropriate description on the right. Eavesdropping

Captures transmission data produced by a card as it is used.

A company is planning to implement a remote access architecture to allow its employees to work from home. The company has a central office where all its servers and applications are located. The employees need to access these resources securely from their home computers. Which remote access architecture would be the most suitable for this scenario?

Client-to-site VPN technology

You have hired ten new temporary employees to be with the company for three months. How can you make sure that these users can only log on during regular business hours?

Configure day/time restrictions in user accounts.

You want to ensure that all users in the Development OU have a common set of network communication security settings applied. Which action should you take?

Create a GPO computer policy for the computers in the Development OU.

You manage an Active Directory domain. All users in the domain have a standard set of internet options configured by a GPO linked to the domain, but you want users in the Administrators OU to have a different set of internet options.What should you do?

Create a GPO user policy for the Administrators OU.

Match each smart card attack on the left with the appropriate description on the right. Fault generation

Deliberately induces malfunctions in a card.

You have a system that allows the owner of a file to identify users and their permissions to the file. Which type of access control model is implemented?

Discretionary access control (DAC)

Match each Active Directory term on the left with its corresponding definition on the right. Collection of network resources

Domain

A large multinational corporation has multiple domains that share the same contiguous DNS namespaces, as well as domains with different DNS namespaces. The IT department is tasked with organizing these domains. Which of the following options best describes how the domains should be grouped?

Domains with the same contiguous DNS namespaces should be grouped into a tree, and all trees should be grouped into a forest.

Which of the following is a characteristic of TACACS+?

Encrypts the entire packet, not just authentication packets

You want to implement an access control list in which only the users you specifically authorize have access to the resource. Anyone not on the list should be prevented from having access. Which of the following methods of access control should the access list use?

Explicit allow, implicit deny

Match each smart card attack on the left with the appropriate description on the right. Software attacks

Exploits vulnerabilities in a card's protocols or encryption methods.

A manufacturing company recently bought out another similar company. They need to link each company's directory systems together to access their resources without merging the two. How can they link the two directory systems together?

Federation

Your financial planning company is forming a partnership with a real estate property management company. One of the requirements is that your company open up its directory services to the property management company to create and access user accounts. Which of the following authentication methods will you be implementing?

Federation

You are a security consultant tasked with implementing a biometric authentication system for a small business. The business owner wants a system that is cost-effective, non-intrusive, and relatively simple for employees to use. Which biometric authentication method would you recommend?

Fingerprint recognition

Match each Active Directory term on the left with its corresponding definition on the right. Collection of related domain trees

Forest

After implementing the National Institute of Standards and Technology (NIST) Cybersecurity Framework, the chief information security officer (CISO) is assessing the company's security posture to identify deficiencies from the framework's recommendations. What process can the CISO run to get a better sense of what the company needs to improve upon?

Gap analysis

Which of the following statements correctly describe the characteristics of generic containers in Active Directory? (Select two.)

Generic containers are used to organize Active Directory objects. Generic containers are created by default.

Which of the following objects identifies a set of users with similar access needs?

Group

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do?

Have Marcus log off and log back in.

A tech company is developing a new software product. The development team is distributed across different locations and needs to securely access and work on specific systems located in the company's main office. The team members need to establish secure communication channels between their individual devices and the specific systems in the office. Which remote access architecture would be the most suitable for this scenario?

Host-to-host tunnel topology

You are the IT security manager for a rapidly growing tech company. The company has been using simple password authentication for all systems. However, with the increasing number of employees and the sensitivity of the data being handled, you decide it's time to harden the authentication methods. Which of the following steps would be the MOST effective in achieving this goal?

Implementing multifactor authentication (MFA) for all systems.

Which of the following is the correct acronym to remember the order in which Group Policy Objects (GPOs) are applied?

LSDOU

You are a network administrator for a large multinational corporation. The corporation has offices in multiple countries and uses various software products from different vendors. The CEO wants to implement a system that stores information about users, computers, security groups/roles, and services, and allows for interoperability between different vendors' products. Which directory service would you recommend?

Lightweight Directory Access Protocol (LDAP)

Group Policy Objects (GPOs) are applied in which of the following orders?

Local Group Policy, GPO linked to site, GPO linked to domain, GPO linked to organizational unit (highest to lowest).

You are configuring the Local Security Policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least five days before changing it again. Which policies should you configure? (Select two.)

Minimum password age Enforce password history

You are configuring the Local Security Policy of a Windows system. You want to require users to create passwords that are at least ten characters in length. You also want to prevent login after three unsuccessful login attempts. Which policies should you configure? (Select two.)

Minimum password length Account lockout threshold

Which of the following principles is implemented in a mandatory access control model to determine object access by classification level?

Need to know

A company wants to set up single sign-on (SSO) without passing credentials through to each piece of software and cloud service. Which protocol would meet this requirement?

OAuth

Match each Active Directory term on the left with its corresponding definition on the right. Network resource in the directory

Object

In a company, different departments actively access various cloud-based applications and services to perform their tasks efficiently. The company's security team has concerns about the growing complexity and risks of managing user credentials across multiple platforms. To address this concern proactively, the team implements a modern authentication solution that actively provides single sign-on (SSO) capabilities, ensuring enhanced user convenience and security. In this scenario, which technology should the organization proactively employ for federation and enabling SSO capabilities effectively across the diverse range of cloud-based applications?

Open Authorization (OAuth)

Match each Active Directory term on the left with its corresponding definition on the right. Logical organization of resources

Organizational unit

Which of the following is the MOST common form of authentication?

Password

The IT department at a small company is revamping its password policies to bolster security. The company wants to ensure employees follow best practices for creating and managing passwords. The department aims to promote a secure environment by implementing password expiration policies. Which method for password management is BEST to promote a secure environment by requiring users to change their passwords after a certain period?

Password expiration

A leading online retail company wants to improve user experience and security for its customers. The security team aims to eliminate the need for users to remember or input complex passwords, reducing the risk of password breaches. Instead, they propose a solution where users can access their accounts seamlessly through a secure link sent to their verified email or via a push notification on a trusted device. This approach should not involve traditional passwords, fingerprint scans, or multiple validation steps. Which authentication method is the security team planning to implement for users?

Passwordless authentication

A corporation's IT department is integrating a new framework that permits, ascertains, and applies various resources in accordance with established company policies. Which principle should the department incorporate?

Policy-driven access control

What is the primary purpose of separation of duties?

Prevent conflicts of interest.

Which technology is primarily used by smart cards to store digital signatures, cryptography keys, and identification codes?

Public Key Infrastructure (PKI)

Which of the following are differences between RADIUS and TACACS+?

RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.

Which of the following are the access levels that are generally granted on the directory in LDAP? (Select two.)

Read-only access Read/write access

A multinational corporation wants to enable its IT support team to provide remote assistance to employees across various locations. The support team needs to be able to take control of the employees' computers to troubleshoot and resolve issues. The corporation primarily uses Windows-based systems. Which technology would be the MOST suitable for this purpose?

Remote Desktop Protocol (RDP)

You have implemented an access control method that only allows users who are managers to access specific data. Which type of access control model is being used?

Role-based access control (RBAC)

Which account type in Linux can modify hard limits using the ulimit command?

Root

Which of the following is an example of rule-based access control?

Router access control lists that allow or deny traffic based on the characteristics of an IP packet.

Which of the following is used by Microsoft for auditing in order to identify past actions performed by users on an object?

SACL

A real estate investment firm wants to implement single sign-on (SSO) for its dozens of services and software. The firm found a vendor to implement that request using the eXtensible Markup Language (XML) standard. What solution does this vendor use for SSO?

SAML

Which type of group can be used for controlling access to objects?

Security

The IT security team at a large tech company is strengthening its authentication methods to protect sensitive company data and systems. The team considered implementing various security measures and understood that each authentication method has distinct features and benefits. However, they must choose the MOST suitable option that aligns with the organization's security requirements and user convenience. Which authentication method utilizes a physical device or software to generate secure, unique codes and offers convenience and strong security?

Security keys

The IT administrator for a large university uses an LDAP directory service to manage user access to various computing resources. To ensure the directory's security, which of the following measures should the administrator implement?

Set up LDAP Secure (LDAPS) with a digital certificate on port 636 for secure user credential exchange.

What is the effect of the following command? chage -M 60 -W 10 jsmith

Sets the password for jsmith to expire after 60 days and gives a warning 10 days before expiration.

You are the IT security manager for a large corporation. The company has been using shared accounts for certain systems due to ease of access and convenience. However, you are considering implementing a policy to prohibit the use of shared accounts. Which of the following are valid reasons for this decision? (Select two.)

Shared accounts can compromise the principle of least privilege. Shared accounts can lead to accountability issues.

Lori, who has been a member of the Project Management group, was recently promoted to manager of the team. She has been added as a member of the Managers group. Several days after being promoted, Lori needs to have performance reviews with the team she manages. However, she cannot access the performance management system. As a member of the Managers group, she should have the Allow permission to access this system. What is MOST likely preventing her from accessing this system?

She is still a member of the Project Management group, which has been denied permission to this system. Deny permissions always override Allow permissions.

An educational institution's systems administrator is responsible for securing the LDAP directory service for the organization's computing resources. Which authentication method should the systems administrator implement to ensure secure access?

Simple Authentication and Security Layer (SASL)

Which of the following are examples of something you have authentication controls? (Select two.)

Smart card Photo ID

After finding a corporate phone unattended in a local mall, an organization decides to enhance its multi-factor authentication (MFA) procedures. What MFA philosophy applies a location-based factor for authentication?

Somewhere you are

The Hide Programs and Features page setting is configured for a specific user as follows: Policy Setting Local Group Policy Enabled Default Domain Policy GPO Not configured GPO linked to the user's organizational unit Disabled After logging in, the user is able to see the Programs and Features page. Why does this happen?

The GPO linked to the user's organizational unit is applied last, so this setting takes precedence.

In a Kerberos authentication system, how does the Ticket Granting Service (TGS) contribute to the single sign-on (SSO) process?

The TGS issues service tickets to clients for accessing specific services.

Which of the following defines the crossover error rate for evaluating biometric systems?

The point where the number of false positives matches the number of false negatives in a biometric system.

You are attempting to delete the temp group but are unable to. Which of the following is the MOST likely cause?

The primary group of an existing user cannot be deleted.

When using Kerberos authentication, which of the following terms is used to describe the token that verifies the user's identity to the target system?

Ticket

What is the primary function of an AAA server in a network?

To handle user requests for access to computer resources

Which of the following protocols is primarily used for secure remote access to a network by creating an encrypted tunnel over the internet?

Transport Layer Security (TLS)

Match each Active Directory term on the left with its corresponding definition on the right. Group of related domains

Tree

You are a system administrator and you notice that a particular user's processes are consuming an unusually high amount of system resources, causing performance issues for other users. You decide to use the ulimit command to limit the resources available to this user's processes. Which of the following options would be the MOST effective solution and why?

Use the -t option to limit the amount of CPU time a process can use.

Which security mechanism uses a unique list that meets the following specifications: The list is embedded directly in the object itself. The list defines which subjects have access to certain objects. The list specifies the level or type of access allowed to certain objects.

User ACL

Which of the following is a privilege or action that can be taken on a system?

User rights

Which of the following identification and authentication factors are often well known or easily discovered by others on the same network or system?

Username

You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration?

Users cannot change the password for 10 days.

A global pharmaceutical company's IT team needs a secure solution for remote employees to access internal company resources from home. The solution must require user authentication, encapsulate and encrypt all traffic between the user and the internal network, and establish a secure tunnel. Which solution should the team choose?

Virtual Private Network (VPN)

You have a group named Research on your system that needs a new password because a member of the group has left the company. Which of the following commands should you use?

gpasswd Research

Which of the following commands creates a new group and defines the group password?

groupadd -p

You are the administrator for a small company, and you need to add a standard new group of users to the system. The group's name is sales. Which command accomplishes this task?

groupadd sales

You have a group named temp_sales on your system. The group is no longer needed, so you should remove it. Which of the following commands should you use?

groupdel temp_sales

You want to see which primary and secondary groups the dredford user belongs to. Enter the command you would use to display group memberships for dredford.

groups dredford

Which of the following commands is used to change the current group ID during a login session?

newgrp

Which of the following utilities could you use to lock a user account? (Select two.)

passwd usermod

Which of the following identifies the type of access that is allowed or denied for an object?

permission

Which of the following commands would you use to view the current soft limits on a Linux machine?

ulimit -a

An employee named Bob Smith, whose username is bsmith, has left the company. You have been instructed to delete his user account and home directory. Which of the following commands would produce the required outcome? (Select two.)

userdel -r bsmith userdel bsmith;rm -rf /home/bsmith

Which of the following commands removes a user from all secondary group memberships?

usermod -G ""

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company. Which command can you use to disable this account?

usermod -L joer

Which of the following commands assigns a user to a primary group?

usermod -g

One of your users, Karen Scott, has recently married and is now Karen Jones. She has requested that her username be changed from kscott to kjones with no other values changed. Which of the following commands would accomplish this?

usermod -l kjones kscott


संबंधित स्टडी सेट्स

Microeconomic Theory Exam 3 Conceptual Question

View Set

MNGT 301 || Chapter 13 - Groups and Teams: Increasing Cooperation, Reducing Conflict

View Set

Statistics proctored exam study guide

View Set

Main Concepts of Chemistry Final Exam

View Set

Chapter 58, Nursing Management: Chronic Neurologic Problems: HA

View Set