This quiz assesses knowledge in network and information security, focusing on logical access control, best practices for resource access, and authentication methods. It is designed for learners preparing for Security+ certification, enhancing skills in securing databases and networks.
Vulnerability assessment
Mandatory access control
Application hardening
Least priviledge
Rate this question:
Add ACLs to computers, add computers to groups
Add ACLs to user; add users to groups
Add users to ACLs; add computers to groups
Add groups to ACLs; add users and computers to groups
Rate this question:
The user's PC is missing the authentication agent
The user's PC is not fully patched
The user's PC is not at the latest service pack
The user's PC has out-of-date antivirus software
Rate this question:
PIN and password
Smartcard and token
Smartcard and PIN
Fingerprint and retina scan
Rate this question:
MD5
CHAP
Kerberos
SLIP
Rate this question:
Create a user account without administrator priviledges
Employ a BIOS password that differs from the domain password
Enforce a group policy with the least amount of account restrictions
Allow users to determine their needs and access to resources
Rate this question:
Seperation of duties
Job-based access control
Least priviledge
Remote access policy
Rate this question:
By function
By department
By geographic location
By management level
Rate this question:
Identification
Authorization
Validation
Repudiation
Rate this question:
CCTV
Firewall
Design reviews
Bollards
Rate this question:
Authentication to multiple devices
Centralized file integrity protection
Non-repudiation
Greater password complexity
Rate this question:
Remote access
Provider cloud
VPN concentrator
Telephony
Rate this question:
Combines authentication and authorization
Encryption of all data between client and server
TACACS+ uses the UDP protocol
TACACS+ has less attribute-value pairs
Rate this question:
Shoulder surfing
Tailgating
Escalation
Impersonation
Rate this question:
Require a PIV card
Utilize time of day restrictions
Implement deny
Utilize seperation of duties
Rate this question:
Smart card
Common access card
Single sign-on
Access control list
Rate this question:
RADIUS
LDAP
TACACS+
Kerberos
Rate this question:
Confidentiality
Availability
Integrity
Non-repudiation
Rate this question:
MS-CHAP
Kerberos
802.1x
EAP
Rate this question:
Video surveillance
External lighting
Physical access log
Access control system
Rate this question:
Access rights indicated by the role of the individual
Access associated with the classification of data
A system administrator to centralized policy
Rights to be assigned by the data owner
Rate this question:
Set a local password policy on each workstation and server
Set a domain password policy
Set a group policy to enforce password changes
Post a memo detailing the requirement of the new password complexity requirements
Rate this question:
RADIUS
OVAL
RAS
IPSec VPN
Rate this question:
NTLM hashing
Dictionary
Brute Force
Encyclopedia
Rate this question:
Two factor
Form factor
Physical factor
Single factor
Rate this question:
Solid state drives
Cell phone cameras
USB drives
NAS
Rate this question:
The mobile device should erase itself after a set number of invalid attempts
The password should be alphanumeric only, due to keypad limitations
The password should be common so that the mobile device can be re-assigned
The mobile device should use and be equipped with removal storage for sensitive data retrieval
Rate this question:
Implement a strict domain level group policy
Supply the users with suggested password guidelines
Offer user training regarding proper policy
Supply the users with a third-party application to hash their passwords
Rate this question:
PIV
MAC
One-time password
Tokens
PAP
NTLMv2
LANMAN
CHAP
Rate this question:
Role-Based Access Control
Rule- Based Access Control
Mandatory Access Control
Discretionary Access Control
Rate this question:
Domain controller
Local SAM databases
ACLs
NAC servers
Rate this question:
Discretionary Access Control
Rule-Based Access Control
Role-Based Access Control
Mandatory Access Control
Rate this question:
Group policy
Time of day restrictions
Password policy
Acceptable use policy
Rate this question:
Extensible authentication protocol
Ticket granting server
Remote access server
Certificate authority
Rate this question:
802.1x
VPN
RADIUS
Antivirus
Rate this question:
Account management
Risk assessment
Vulnerability assessment
Patch management
Rate this question:
HR employees
All employees
Executive management and Information security employees
Vendors
Rate this question:
Domain
Physical memory
User documentation
Security group
Rate this question:
ID badges
Proximity cards
Escorts
Log book
Rate this question:
Permit man-in-middle attacks to steal users credentials
Are irratating to the user but the traffic remains encrypted; breed complacency among users for all certification warnings
Expose traffic sent between the server and the user's computer
Increase resources used by the company's web-servers
Rate this question:
Remove unnecessary users from groups with permissions to the resources
Restrict group membership to users who do not print often
Set the printer to standby mode after hours
Ensure that all user groups have permission to all printers
Rate this question:
Behavior-based security
Logical tokens
Least priviledge
Role-based access control
Rate this question:
A password and a PKI certificate
A retina and fingerprint scan
A security badge and a physical token
A passphrase and PIN
Rate this question:
Place all the people into distribution groups. Assign printer access by access group
Place all the people into department groups. Assign printer access by matching individuals to printer groups
Place all the people into departmental groups. Assign access to all printers for each group
Place all the people into departmental groups. Assign printer access by matching group to department
Rate this question:
RRAS
TKIP
RADIUS
RSA
Rate this question:
Three factor authentication
Single sign-on
On factor authentication
Two factor authentication
Rate this question:
Time of day restrictions
Implicit deny
Account expiration
Two factor authentication
Rate this question:
Quiz Review Timeline (Updated): May 1, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.