Testout Chapter 6

Ace your homework & exams now with Quizwiz!

What is the process of controlling access to resources such as computers, files, or printers called? A. Authorization B. Mandatory access control C. Conditional access D. Authentication

A. Authorization

You want to ensure that all users in the Development OU have a common set of network communication security settings applied. Which action should you take? A. Create a GPO computer policy for the computers in the Development OU. B. Create a GPO folder policy for the folders containing the files. C. Create a GPO computer policy for the Computers container. D. Create a GPO user policy for the Development OU.

A. Create a GPO computer policy for the computers in the Development OU.

What type of password is maryhadalittlelamb? A. Passphrase B. Composition C. Static D. Cognitive

A. Passphrase

What is mutual authentication? A. Deploying CHAP and EAP on remote access connections. B. A process by which each party in an online communication verifies the identity of the other party. C. Using a certificate authority (CA) to issue certificates. D. The use of two or more authentication factors.

B. A process by which each party in an online communication verifies the identity of the other party.

Which of the following account types is a cloud-based identity and access management service that provides access to both internal and external resources? A. Domain B. Azure AD C. Microsoft D. Administrator

B. Azure AD

What should you do to a user account if the user goes on an extended vacation? A. Monitor the account more closely B. Disable the account C. Remove all rights from the account D. Delete the account

B. Disable the account

Which of the following account types uses a single sign-on system that lets you access Windows, Office 365, Xbox Live, and more? A. Domain B. Microsoft C. Azure AD D. Administrator

B. Microsoft

You have implemented an access control method that only allows users who are managers to access specific data. Which type of access control model is being used? A. DAC B. RBAC C. MAC D. DACL

B. RBAC

Which account type in Linux can modify hard limits using the ulimit command? A. Standard B. Root C. User D. Administrator

B. Root

Which of the following is a password that relates to things that people know, such as a mother's maiden name or a pet's name? A. Dynamic B. One-time C. Cognitive D. Passphrase

C. Cognitive

Which of the following authentication protocols transmits passwords in cleartext and, therefore, is considered too unsecure for modern networks? A. CHAP B. EAP C. PAP D. RADIUS

C. PAP

You often travel away from the office. While traveling, you would like to use your laptop computer to connect directly to a server in your office and access files. You want the connection to be as secure as possible. Which type of connection do you need? A. Intranet B. Virtual private network C. Remote access D. Internet

C. Remote access

Which of the following commands is used to change the current group ID during a login session? A. usermod B. groups C. newgrp D. groupmod

C. newgrp

Which of the following utilities could you use to lock a user account? A. useradd B. ulimit C. passwd D. userdel

C. passwd

A remote access user needs to gain access to resources on the server. Which of the following processes are performed by the remote access server to control access to resources? A. Authentication and accounting B. Identity proofing and authentication C. Identity proofing and authorization D. Authentication and authorization E. Authorization and accounting

D. Authentication and authorization

You want to make sure that all users have passwords over eight characters in length and that passwords must be changed every 30 days. What should you do? A. Configure day/time settings in user accounts B. Configure expiration settings in user accounts C. Configure account lockout policies in Group Policy D. Configure account policies in Group Policy

D. Configure account policies in Group Policy

A manager has told you she is concerned about her employees writing their passwords for websites, network files, and database resources on sticky notes. Your office runs exclusively in a Windows environment. Which tool could you use to prevent this behavior? A. Computer Management B. Key Management Service C. Local Users and Groups D. Credential Manager

D. Credential Manager

Which type of group can be used for controlling access to objects? A. Distribution B. Authorization C. DACL D. Security

D. Security

You are attempting to delete the temp group but are unable to. Which of the following is the MOST likely cause? A. Groups cannot be deleted. B. All users have already been deleted. C. The secondary group of an existing user cannot be deleted. D. The primary group of an existing user cannot be deleted.

D. The primary group of an existing user cannot be deleted.

You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration? A. The password must contain 10 or more characters. B. The previous 10 passwords cannot be reused. C. Users must change the password at least every 10 days. D. Users cannot change the password for 10 days. E. The password must be entered within 10 minutes of the login prompt being displayed.

D. Users cannot change the password for 10 days.


Related study sets

Charismatic Leadership (transformational)

View Set

Econ 150 Chapter 9 Pure Monopoly

View Set

SAT Vocabulary, SAT PREP, SAT, HUGE vocab for SAT 1

View Set

Chp. 32 PrepU Questions: Assessment of Hematologic Function and Treatment Modalities (Exam 1)

View Set

Neurocognitive Disorder (Alzheimer's Disease)

View Set

Accounting Chapter 7-Accounting for Liabilities

View Set