hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Chapter 12
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (20)
MS-CHAP
Which of the following is the Microsoft version of CHAP?
MS-CHAP
AD-EAP
EAP-MS
PAP-MICROSOFT
MAC
Which access control model is the most restrictive?
DAC
MAC
Role-Based Access Control
Rule-Based Access Control
ACLs
What can be used to provide both file system security and database security?
RBASEs
CHAPs
LDAPs
ACLs
All orphaned and dormant accounts should be deleted immediately whenever they are discovered.
Which of the following is NOT true regarding how an enterprise should handle an orphaned or a dormant account?
A formal procedure should be in place for disabling accounts for employees who are dismissed, resign, or retire from the organization.
Access should be ended as soon as the employee is no longer part of the organization.
Logs should be monitored because current employees are sometimes tempted to use an older dormant account instead of their own account.
All orphaned and dormant accounts should be deleted immediately whenever they are discovered.
Access
Which of the following is NOT part of the AAA framework?
Access
Authentication
Authorization
Accounting
LDAPS
What is the secure version of LDAP?
Secure DAP
802.1x
LDAPS
X.500
Custodian
Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking?
Operator
Custodian
Privacy officer
End-user
Location-based policies
Which can be used to establish geographical boundaries where a mobile device can and cannot be used?
Geolocation policies
Location-based policies
Mobile device policies
Restricted access control policies
supplication
A RADIUS authentication server requires the ________ to be authenticated first.
authenticator
authentication server
user
supplicant
Access
Which of the following involves rights given to access specific resources?
Authorization
Access
Accounting
Identification
ABAC
Which type of access control model uses predefined rules that makes it flexible?
MAC
ABAC
DAC
Rule-Based Access Control
It allows secure web domains to exchange user authentication and authorization data.
How is the Security Assertion Markup Language (SAML) used?
It allows secure web domains to exchange user authentication and authorization data.
It is an authenticator in IEEE 802.1x.
It is no longer used because it has been replaced by LDAP.
It is a backup to a RADIUS server.
DAC
What is the least restrictive access control model?
MAC
Rule-Based Access Control
DAC
ABAC
LDAP
What is the version of the X.500 standard that runs on a personal computer over TCP/IP?
LDAP
Lite RDAP
IEEE X.501
DAP
Do not share passwords with other employees
Which of the following would NOT be considered as part of a clean desk policy?
Do not share passwords with other employees.
Place laptops in a locked filing cabinet.
Keep mass storage devices locked in a drawer when not in use.
Lock computer workstations when leaving the office.
Group Policy
Which Microsoft Windows feature provides group-based access control for centralized management and configuration of computers and remote users who are using Active Directory?
Windows Registry Settings
Resource Allocation Entities
Group Policy
AD Management Services (ADMS)
RADIUS
With the development of IEEE 802.1x port security, what type of authentication server has seen even greater usage?
Lite RDAP
RDAP
RADIUS
DAP
Access control list (ACL)
Which of these is a set of permissions that is attached to an object?
Subject Access Entity (SAE)
Access control list (ACL)
Object modifier
Security entry designator
TACACS+
What is the current version of TACACS?
TACACS+
TRACACS
TACACS v9
XTACACS
It dynamically assigns roles to subjects based on rules.
Which statement about Rule-Based Access Control is true?
It is considered a real-world approach by linking a user's job function with security.
It requires that a custodian set all rules.
It dynamically assigns roles to subjects based on rules.
It is considered obsolete today.
Students also viewed
ch.13
20 terms
ch. 12
20 terms
Unit 14 quiz
20 terms
Module 14
20 terms
Sets found in the same folder
Unit 14 quiz
20 terms
Unit 10 Quiz
20 terms
Chapter 13
20 terms
Security+ Chapter 4
20 terms
Other sets by this creator
Splunk Fundamentals
54 terms
Security Incident Response (SIR)
102 terms
IS-522 Module 8
10 terms
IS-522 Module 7
20 terms
Verified questions
other
Which of the following statements about private club guests is CORRECT? Guests must pay for any service of alcoholic beverages. Guests own the alcoholic beverages of a private club. Guests are not permitted to pay for any service of alcoholic beverages. Guests must pay for any alcoholic beverages they consume.
other
A listing of strengths, weaknesses, and plans of actions designed to improve a person's employability.
other
When is a wrecker considered to be an emergency vehicle? When they are loading along a roadway All of the answers are correct When their amber light is rotating or on When they performing a recovery along a roadway
other
Which of the following is part of the highway transportation system (HTS)? (a) vehicles (b) roadways (c) people (d) all of these
Other Quizlet sets
KNS 350 PA Epi Final
103 terms
Chapter 8: Listing Agreements
22 terms
Chapter 3 Worksheet
29 terms
Science Changes in Motion
17 terms