Filters
Question type

Study Flashcards

The action that is taken by a subject over an object is called a(n) :


A) authorization
B) access
C) control
D) operation

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Matching -​The practice of requiring that processes should be divided between two or more individuals.


A) Account expiration
B) Discretionary access control (DAC)
C) Extended TACACS (XTACACS)
D) Job rotation
E) LDAP injection attack
F) Least privilege
G) Mandatory access control (MAC)
H) Separation of duties
I) TACACS+
J) Time-of-day restriction

K) A) and B)
L) A) and C)

Correct Answer

verifed

verified

During RADIUS authentication, what type of packet includes information such as identification of a specific AP that is sending the packet and the username and password?


A) accounting request
B) access request
C) verification request
D) authentication request

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

To assist with controlling orphaned and dormant accounts, what can be used to indicate when an account is no longer active?


A) Password expiration
B) Account expiration
C) Last login
D) Account last used

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

A RADIUS ____________________ is a computer that forwards RADIUS messages among RADIUS clients and RADIUS servers.

Correct Answer

verifed

verified

Which access control model is considered to be the least restrictive?


A) Role Based Access Control
B) Mandatory Access Control
C) Rule Based Access Control
D) Discretionary Access Control

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A list that specifies which subjects are allowed to access an object and what operations they can perform on it is referred to as a(n) :


A) ACE
B) DAC
C) entity
D) ACL

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Describe the MAC lattice model.

Correct Answer

verifed

verified

Different "rungs" on the MAC lattice mod...

View Answer

Matching -​The most restrictive access control model, typically found in military settings in which security is of supreme importance.


A) Account expiration
B) Discretionary access control (DAC)
C) Extended TACACS (XTACACS)
D) Job rotation
E) LDAP injection attack
F) Least privilege
G) Mandatory access control (MAC)
H) Separation of duties
I) TACACS+
J) Time-of-day restriction

K) D) and H)
L) C) and G)

Correct Answer

verifed

verified

In a UAC prompt, what color is used to indicate the lowest level of risk?


A) red
B) gray
C) yellow
D) green

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer