1.
Which of the following logical access control methods would a security administrator need to modify in order to control network traffic passing through a router to a different network?
A. 
B. 
C. 
D. 
Role-based access control changes
2.
After installing database software the administrator must manually change the default administrative password, remove a default database, and adjust permissions on specific files. These actions are BEST described as:
A. 
B. 
C. 
D. 
3.
Which of the following methods is a best practice for granting access to resources?
A. 
Add ACLs to computers, add computers to groups
B. 
Add ACLs to user; add users to groups
C. 
Add users to ACLs; add computers to groups
D. 
Add groups to ACLs; add users and computers to groups
4.
Which of the following may cause a user, connected to NAC-enabled network, to not be prompted for credentials
A. 
The user's PC is missing the authentication agent
B. 
The user's PC is not fully patched
C. 
The user's PC is not at the latest service pack
D. 
The user's PC has out-of-date antivirus software
5.
Which of the following is an example of two-factor authentication?
A. 
B. 
C. 
D. 
Fingerprint and retina scan
6.
Which of the following uses a three-way handshake for authentication and is commonly used in PPP connections?
A. 
B. 
C. 
D. 
7.
To ensure users are logging into their systems using a least priviledge method, which of the following should be done?
A. 
Create a user account without administrator priviledges
B. 
Employ a BIOS password that differs from the domain password
C. 
Enforce a group policy with the least amount of account restrictions
D. 
Allow users to determine their needs and access to resources
8.
A user wants to edit a file that they currently have read-only rights to; however, they are unable to provide a business justification, so the request is denied. This is the principle of:
A. 
B. 
C. 
D. 
9.
Which of the following is a BEST practice for organizing users when impementing a least priviledge model?
A. 
B. 
C. 
D. 
10.
The process of validating a user's claimed identity is called:
A. 
B. 
C. 
D. 
11.
Which of the following is a detective security control?
A. 
B. 
C. 
D. 
12.
Which of the following is a reason to implement Kerberos over local system authentication?
A. 
Authentication to multiple devices
B. 
Centralized file integrity protection
C. 
D. 
Greater password complexity
13.
Which of the following faciliates computing for heavily utilized systems and networks?
A. 
B. 
C. 
D. 
14.
Which of the following is a reason to use TACACS+ over RADIUS?
A. 
Combines authentication and authorization
B. 
Encryption of all data between client and server
C. 
TACACS+ uses the UDP protocol
D. 
TACACS+ has less attribute-value pairs
15.
Which of the following describes an attack technique by which an intruder gains physical access by following an authorized user into a fcility before the door is closed?
A. 
B. 
C. 
D. 
16.
Which of the following access control methods provides the BEST protection against attackers logging on as authorized user?
A. 
B. 
Utilize time of day restrictions
C. 
D. 
Utilize seperation of duties
17.
Centrally authenticating multiple systems and applications against a federated user database is an example of:
A. 
B. 
C. 
D. 
18.
Which of the following uses tickets to identify users to the network?
A. 
B. 
C. 
D. 
19.
Which of the following is an example of implementing security using the least priviledge principle?
A. 
B. 
C. 
D. 
20.
Which of the following is an authentication method that uses symmetric key encryption and a key distribution center?
A. 
B. 
C. 
D. 
21.
Which of the following is a preventative physical security measure?
A. 
B. 
C. 
D. 
22.
Mandatory Acess Control (MAC) allows:
A. 
Access rights indicated by the role of the individual
B. 
Access associated with the classification of data
C. 
A system administrator to centralized policy
D. 
Rights to be assigned by the data owner
23.
The administrator needs to require all users to use complex passwords. Which of the following would be the BEST way to do this?
A. 
Set a local password policy on each workstation and server
B. 
Set a domain password policy
C. 
Set a group policy to enforce password changes
D. 
Post a memo detailing the requirement of the new password complexity requirements
24.
Which of the following would be used to eliminate the need for an administrator to manually configure passwords on each network device in a larg LAN?
A. 
B. 
C. 
D. 
25.
The security administrato needs to determine whether common words and phrases are being used as passwords on the company server. Which of the following attacks would MOST easily accomplish this task?
A. 
B. 
C. 
D.