Security + Lessons 1-5 Multiple Choice Questions and Answers

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Anytime you use a password, you should make it ________. constantly changing migrating strong simple

Answer: strong

What directory service is used with Windows domains? Active Directory E-Directory PAM Kerberos

Answer: Active Directory

Which of the following is not a complex password? Platter*SAN John!Taylor Password01 ThereisTimetoLive&Die

Answer: John!Taylor

What authentication type is the defualt for Active Directory? NTKM Kerberos MS-CHAP MS-CHAPv2

Answer: Kerberos

Which authentication sends the username and password in plain text? MS-CHAP CHAP PAP SPAP

Answer: PAP (Password Authentication Protocol)

Which of the following is a secret numeric password used for authentication? security token digital certificate digital signature PIN

Answer: PIN

When you create a local user on a computer running in Windows 7, where is the user account stored? Active Directory SAM PAN SQL database

Answer: SAM (Security Account Manager)

Which concept determines what resources users can access after they log on? authentication auditing access control defense in depth

Answer: access control

What settings are used to keep track of incorrect logon attempts and lock the account if too many attempts are detected within a certain time set? account lockout password policy authentication tracker user parameters

Answer: account lockout

What is the process of keeping track of a user's activity? authentication authorization accounting authoring

Answer: accounting

What do you call the scope that hacker can use to break into a system? defense in depth attack surface principle of least privilege risk mitigation

Answer: attack surface

What is used to verify that an administrator is not accessing data that he should not be accessing? authentication encryption access control auditing

Answer: auditing

What technology is not used to implement confidentiality? encryption access controls auditing authentication

Answer: auditing

What do you call the process in which a user is identified via a username and password? authentication authorization accounting auditing

Answer: authentication

What is the process of identifying an individual? authentication authorization accounting auditing

Answer: authentication

What is used to identify a person before giving access? authentication encryption access control auditing

Answer: authentication

What is the process of giving individual access to a system or resource? authentication authorization accounting auditing

Answer: authorization

What type of authentication method identifies and recognizes people based on physical traits such as fingerprints? digital certificates WEP biometrics RADIUS

Answer: biometrics

What do you call a password that is at least seven characters long and uses three of the following categories (uppercase, lowercase, numbers, and special characters)? healthy password migrating password standard password complex password

Answer: complex password

Which of the following terms indicates that information is to be read only by those people for whom it is intended? confidentiality integrity availability accounting

Answer: confidentiality

What is used to provide protection when one line of defense is breached? defense in depth attack surface principle of least privilege risk mitigation

Answer: defense in depth

What type of electronic document contains a public key? digital certificate biometrics PIN PAN

Answer: digital certificate

What type of server runs Active Directory? member server file server domain controller NTLAN server

Answer: domain controller

What is the best way to protect against social engineering? stronger encryption stronger authentication employee awareness risk mitigation

Answer: employee awareness

What is the processs of converting data into a format that cannot be read by another user? encryption locking keying registering

Answer: encryption

What type of permissions are assigned directly to a file or folder? explicit inherited encompassing overriding

Answer: explicit

What do you use to define how long a password is in Windows? registry Users applet in the Control Panel group policies NTFS files

Answer: group policies

When you access permissions to a folder, you should first grant permissions to ___________ rather than users. groups computers collections organizational units

Answer: groups

Which of the folllowing makes sure that data is not changed when it not supposed to be? confidentiality integrity availability accounting

Answer: integrity

What is a physical or logical device used to capture keystrokes? USB flash drive PDA Smartphone keylogger

Answer: keylogger

What setting forces users to change their password? minimum password age maximum password age password history account lockout

Answer: maximum password age

What prevents users from changing a password multiple times so that they can change it to their original password? minimum password age maximum password age password history account lockout

Answer: minimum password age

What is needed to highly secure a system? lost in time more money system update disabled administrator account

Answer: more money

What process prevents someone from denying that she accessed a resource? accounting authorization sniffing nonrepudiation

Answer: nonrepudiation

What settings are used to prevent users from reusing the same password over and over? minimum password age maximum password age password history account lockout

Answer: password history

Which of the followinf is not a response when dealing with a risk? avoidance mitigation transfer patching

Answer: patching

When you grant access to print to a printer, what are you granting? right permission accessible key

Answer: permission

What is the first line of defense when setting up a network? physically secure the network configure authentication configure encryption configure an ACL

Answer: physically secure the network

What do you call the security discipline that requires that a user is given no more privilege necessary to perform his or her job? defense in depth reduction of attack surface risk transfer principle of least privilege

Answer: principle of least privilege

What type of device can be easily lost or stolen or can be used for espionage? processors RAM chips removable devices servers

Answer: removable devices

What authorizes a user to perform certain actions in Windows such as logging on or performing a backup? right permission accessible key

Answer: right

In dealing with risks, which response is done by buying insurance to protect your bottom line if such a disaster or threat is realized? risk avoidance risk acceptance risk mitigation risk transfer

Answer: risk transfer

Which type of group can be granted rights and permissions? security distribution authorizing SAM

Answer: security

What item, about the size of a credit card, allows access to a network and its resources? digital certificate smart card security token biometric

Answer: smart card

What method used by a hacker relies on the trusting nature of the person being attacked? social engineering attack surface principle of least privilege risk avoidance

Answer: social engineering

In Windows, what do you use ro enable auditing? registry group policies NTFS permissions access log

NTFS permissions

What type of attack tries to guess passwords by trying common words? dictionary attack brute-force attack man-in-the-middle attack smurf attack

dictionary attack

What is the most common form of authentication? password PIN digital certificates smart cards

Answer: password

Where are users and permissions stored for an NTFS folder? access log access file registry ACL

Answer: registry


संबंधित स्टडी सेट्स

English IV Midterm - COMMONLIT: THE CASK OF AMONTILLADO

View Set

Functional Organization of the Immune System

View Set

Anthropology - Chapter 4 - Archaeology Fieldwork - Recharge Questions

View Set

MGMT 346 Chapter 21 Material Requirements

View Set