Chapter 8 Cybersecurity

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Immediately after successful authentication against an AAA data source

During the AAA process, when will authorization be implemented?

Remote access

The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy it this?

The use of UDP ports for authentication and accounting, Encryption of the password only

What are two characteristics of the RADIUS protocol? (Choose two.)

One safeguard failure does not affect the effectiveness of other safeguards

What is a characteristic of a layered defense-in-depth security approach?

Vulnerabilities in systems are exploited to grant higher levels of privilege than someone or some process should have

What is privilege escalation?

Accounting

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

Authorization

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

Department of Homeland Security

Which of the following offers a free service called Automated Indicator Sharing that enables the real-time exchange of cyberthreat indicators?

Company

Which type of business policy establishes the rules of conduct and responsibilities of employees and employers?

Authentication

Passwords, paraphrases, and PINs are examples of which security term?

Artichoke

With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?


Set pelajaran terkait

Chp 6 - Business Strategy: Differentiation, Cost Leadership

View Set

Quiz 1: Vocabulary and Pronunciation

View Set

Chapter 19 Cost-Volume-Profit Analysis: Additional Issues

View Set

Module 4 NUR 114 (Ch.74 IGGY), chapter 73 Medsurg Transgender, Chapter 72: Care of Patients with Male Reproductive Problems, Adult Health Exam 4

View Set