Lesson 8

Ace your homework & exams now with Quizwiz!

Password complexity, password history, and password reuse are all examples of what?

account policies

A person's name, age, location, or job title are all examples of what?

attributes

Which of the following technologies is the least effective means of preventing shared accounts?

password complexity requirements

Michelle enables the Windows 10 picture password feature to control logins for her laptop. Which type of attribute will it provide?

something you can do

What type of access control scheme best describes the Linux filesystem?

DAC (discretionary access control)

Elaine wants to implement an AAA system. Which of the following is an AAA system she could implement?

RADIUS

Theresa wants to implement an access control scheme that sets permissions based on what the individual's job requires. Which of the following schemes is most suited to this type of implementation?

RBAC (role-based access control)

Scott wants to allow users to bring their own credentials to his website so that they can log in using a Google or Microsoft account without giving him their passwords. What protocol can he use that will allow those users to grant the website access to their information?

OpenID

A biometric factor is an example of what type of factor?

something you are

Which of the following include passwords, PINs, or the answer to a security question?

something you know

Trevor is deploying the Google Authenticator mobile application for use in his organization. What type of one-time password system does Google Authenticator use in its default mode?

time-based one-time passwords

What is an HSM used for?

to generate, manage and securely store cryptographic keys

Nina's organization uses SSH keys to provide secure access between systems. Which of the following is NOT a common security concern when using SSH keys?

weak encryption

Which type of multifactor authentication is considered the least secure?

SMS

Charles has implemented LDAP for his organization. What type of service has he enabled?

a directory service

Melissa is planning on implementing biometric authentication on her network. Which of the following should be a goal for any biometric solution she selects?

Low CER

What type of attack does an account lockout policy help to prevent?

brute force

Which of the following biometric technologies is most broadly deployed due to its ease of use and acceptance from end users?

fingerprint scanner

Samantha wants to set an account policy that ensures that devices can be used only while the user is in the organization's main facility. What type of account policy should she set?

geofencing

Angela has chosen to federate with other organizations to allow use of services that each organization provides. What role does Angela's organization play when they authenticate their users and assert that those users are valid to other members of the federation?

identity provider


Related study sets

Chapter 30 Hematologic System, Chapter 31 Hematologic Problems, Hematological probs

View Set

Interest Groups: Organizing for Influence

View Set

Ch 40 prepu oxygenation and perfusion

View Set

Physical Assessment - Mental Status and Cranial Nerves

View Set

Chapter 9,10,11,12 TEST 3 Medical terminology

View Set

Chapter 49: Assessment and Management of Patients with Hepatic Disorders, Cancer questions, theories 3 test 5

View Set

BA302 Organizational Behavior - Chapter 4 Attitudes COMBINED

View Set