1.Which of the following aims to support distributed authentication and authorization over the Internet?
Federation services
2.In Windows network, transitive trust is used among the different domains inside a forest for implementing:
Authentication
3.In which of the following types of access control is the default for Windows systems and has access determined by the owner of a resource?
Discretionary access control
4.Which of the following are responsibilities of the certificate authority (CA) that cannot be outsourced? (Choose all that apply.)
Key generation
Maintaining the CRL
5.Public keys of compromised certificates can be found in which ways? (Choose all that apply.)
OCSP
CRL
6.A security administrator uses third-party certificate authorities plus their own set of enterprise certificate authorities. How is a list of trusted certificate authorities delivered to a browser? (Choose all that apply.)
Browser manufacturer
Group policy
7.A network administrator has a domain that includes single location. They want to store a copy of digital certificates with a trusted third party. What should be implemented?
Key escrow
8.Which of the following are recompiled UNIX tools that can hide evidence of the intrusion?
Rootkits
9.Which of the following are valid types of password attack? [Choose all that apply.]
Dictionary attack
Rainbow table
Brute force attack
Birthday attack
Hybrid attack
10.What is always the first line of defense in protecting data and information?
Passwords
11.Which of the following factors should be considered and addressed in regards to account policy enforcement? [Choose all that apply.]
Group policy
Password expiration
Account recovery
Credential management
Password complexity
12.What is a token system that requires the user to enter the code along with a PIN called?
Multifactor authentication system
13.Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?
OAuth
14.Creating a pattern of where a user accesses a remote web account is an example of which of the following?
Geolocation
15.Which authentication factor is based on a unique talent that a user possesses?
What you do
16.Each of the following accounts should be prohibited EXCEPT:
Privileged accounts
17.Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?
Brute force attack
18.Which of these is NOT a characteristic of a weak password?
A long password
19.Why should the account lockout threshold not be set too low?
It takes more time to generate candidate password digests.
20.How is key stretching effective in resisting password attacks?
It takes more time to generate candidate password digests.
21.Which of the following should NOT be stored in a secure password database?
Plaintext password
22.____ biometrics is related to the perception, thought processes, and understanding of the user.
Cognitive
23.Which human characteristic is NOT used for biometric identification?
Height
24.What is a hybrid attack?
An attack that combines a dictionary attack with a mask attack
25.What is a disadvantage of biometric readers?
An attack that combines a dictionary attack with a mask attack
26.What is a disadvantage of biometric readers?
Cost
27.Using one authentication credential to access multiple accounts or applications is known as _____.
single sign-on
28.Which of these is a U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel?
Common Access Card (CAC)
29.Which type of password attack is a more targeted brute force attack that uses placeholders for characters in certain positions of the password?
Mask attack
30.A TOTP token code is generally valid for what period of time?
For as long as it appears on the device
31.Which one-time password is event-driven?
HOTP
32.Which of these is NOT a reason why users create weak passwords?
Most sites force users to create weak passwords even though they do not want to.
33.Which of the following would NOT be considered as part of a clean desk policy?
Do not share passwords with other employees.
34.What is the current version of TACACS?
TACACS+
35.Which access control model is the most restrictive?
MAC
36.Which Microsoft Windows feature provides group-based access control for centralized management and configuration of computers and remote users who are using Active Directory?
Group Policy
37.Which of the following is the Microsoft version of CHAP?
MS-CHAP
38.Which of the following is NOT true regarding how an enterprise should handle an orphaned or a dormant account?
All orphaned and dormant accounts should be deleted immediately whenever they are discovered.
39.Which type of access control model uses predefined rules that makes it flexible?
ABAC
40.A RADIUS authentication server requires the ________ to be authenticated first.
supplicant
41.Which can be used to establish geographical boundaries where a mobile device can and cannot be used?
Location-based policies
42.Which of the following involves rights given to access specific resources?
Access
43.How is the Security Assertion Markup Language (SAML) used?
It allows secure web domains to exchange user authentication and authorization data.
44.Which statement about Rule-Based Access Control is true?
It dynamically assigns roles to subjects based on rules.
45.Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking?
Custodian
46.With the development of IEEE 802.1x port security, what type of authentication server has seen even greater usage?
RADIUS
47.What is the least restrictive access control model?
DAC
48.What is the secure version of LDAP?
LDAPS
49.What is the version of the X.500 standard that runs on a personal computer over TCP/IP?
LDAP
50.What can be used to provide both file system security and database security?
ACLs
51.Which of the following is NOT part of the AAA framework?
Access
52.Which of these is a set of permissions that is attached to an object?
Access control list (ACL)
Other Links:
Statistics Quiz
Networking Quiz
See other websites for quiz:
Check on QUIZLET
Check on CHEGG