IS5403 Week 6 all Quizezz

1.Which of the following aims to support distributed authentication and authorization over the Internet?

Federation services

2.In Windows network, transitive trust is used among the different domains inside a forest for implementing:

Authentication

3.In which of the following types of access control is the default for Windows systems and has access determined by the owner of a resource?

Discretionary access control

4.Which of the following are responsibilities of the certificate authority (CA) that cannot be outsourced? (Choose all that apply.)

Key generation
Maintaining the CRL

5.Public keys of compromised certificates can be found in which ways? (Choose all that apply.)

OCSP
CRL

6.A security administrator uses third-party certificate authorities plus their own set of enterprise certificate authorities. How is a list of trusted certificate authorities delivered to a browser? (Choose all that apply.)

Browser manufacturer
Group policy

7.A network administrator has a domain that includes single location. They want to store a copy of digital certificates with a trusted third party. What should be implemented?

Key escrow

8.Which of the following are recompiled UNIX tools that can hide evidence of the intrusion?

Rootkits

9.Which of the following are valid types of password attack? [Choose all that apply.]

Dictionary attack
Rainbow table
Brute force attack
Birthday attack
Hybrid attack

10.What is always the first line of defense in protecting data and information?

Passwords

11.Which of the following factors should be considered and addressed in regards to account policy enforcement? [Choose all that apply.]

Group policy
Password expiration
Account recovery
Credential management
Password complexity

12.What is a token system that requires the user to enter the code along with a PIN called?

Multifactor authentication system

13.Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?

OAuth

14.Creating a pattern of where a user accesses a remote web account is an example of which of the following?

Geolocation

15.Which authentication factor is based on a unique talent that a user possesses?

What you do

16.Each of the following accounts should be prohibited EXCEPT:

Privileged accounts

17.Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?

Brute force attack

18.Which of these is NOT a characteristic of a weak password?

A long password

19.Why should the account lockout threshold not be set too low?

It takes more time to generate candidate password digests.

20.How is key stretching effective in resisting password attacks?

It takes more time to generate candidate password digests.

21.Which of the following should NOT be stored in a secure password database?

Plaintext password

22.____ biometrics is related to the perception, thought processes, and understanding of the user.

Cognitive

23.Which human characteristic is NOT used for biometric identification?

Height

24.What is a hybrid attack?

An attack that combines a dictionary attack with a mask attack

25.What is a disadvantage of biometric readers?

An attack that combines a dictionary attack with a mask attack

26.What is a disadvantage of biometric readers?

Cost

27.Using one authentication credential to access multiple accounts or applications is known as _____.

single sign-on

28.Which of these is a U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel?

Common Access Card (CAC)

29.Which type of password attack is a more targeted brute force attack that uses placeholders for characters in certain positions of the password?

Mask attack

30.A TOTP token code is generally valid for what period of time?

For as long as it appears on the device

31.Which one-time password is event-driven?

HOTP

32.Which of these is NOT a reason why users create weak passwords?

Most sites force users to create weak passwords even though they do not want to.

33.Which of the following would NOT be considered as part of a clean desk policy?

Do not share passwords with other employees.

34.What is the current version of TACACS?

TACACS+

35.Which access control model is the most restrictive?

MAC

36.Which Microsoft Windows feature provides group-based access control for centralized management and configuration of computers and remote users who are using Active Directory?

Group Policy

37.Which of the following is the Microsoft version of CHAP?

MS-CHAP

38.Which of the following is NOT true regarding how an enterprise should handle an orphaned or a dormant account?

All orphaned and dormant accounts should be deleted immediately whenever they are discovered.

39.Which type of access control model uses predefined rules that makes it flexible?

ABAC

40.A RADIUS authentication server requires the ________ to be authenticated first.

supplicant

41.Which can be used to establish geographical boundaries where a mobile device can and cannot be used?

Location-based policies

42.Which of the following involves rights given to access specific resources?

Access

43.How is the Security Assertion Markup Language (SAML) used?

It allows secure web domains to exchange user authentication and authorization data.

44.Which statement about Rule-Based Access Control is true?

It dynamically assigns roles to subjects based on rules.

45.Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking?

Custodian

46.With the development of IEEE 802.1x port security, what type of authentication server has seen even greater usage?

RADIUS

47.What is the least restrictive access control model?

DAC

48.What is the secure version of LDAP?

LDAPS

49.What is the version of the X.500 standard that runs on a personal computer over TCP/IP?

LDAP

50.What can be used to provide both file system security and database security?

ACLs

51.Which of the following is NOT part of the AAA framework?

Access

52.Which of these is a set of permissions that is attached to an object?

Access control list (ACL)

Other Links:

Statistics Quiz


Networking Quiz


See other websites for quiz:

Check on QUIZLET


Check on CHEGG











Leave a Reply

Your email address will not be published. Required fields are marked *