With _______________, access decisions are based on the roles that...
Which of the following is NOT a valid access control mechanism?
A smartcard represents:
All logs are kept on archive for a period of time. What determines...
A password represents:
Which if the following technologies would you use if you need to...
For which of the following can biometrics be used?
Identify the process where users can access numerous resources without...
Which of the following are used to make access decisions in a MAC...
Identify the authentication system where a unique username and...
An administrator wishes to enable network auditing policies. Which of...
Which of the following best describes an access control mechanism in...
Least privilege is defined as giving access to information:
A centralized database of remote users for a multi-site network...
What authentication model uses a smart card and a User ID/Password for...
You work as the security administrator at Certkiller .com. Certkiller...
Which of the following is the most costly method of an authentication?
A company creates its own application that accesses the company
...
Which of the following access control methods allows access control...
Why are clocks used in a Kerberos authentication system?
With Discretionary access controls, who determines who has access and...
Which of the following is NOT a good password deployment guideline?
Identify the access decisions based on a Mandatory Access Control...
Identify the method that should be used to ensure that the user is...
Determine the access control model where users are assigned access...
What is based upon an authentication server that allocates tickets to...
How many ports in TCP/IP (Transmission Control Protocol/Internet...
Enforcing minimum privileges for general system users
...
Microsoft supports the _______________ and ______standards for use in...
Which of the following best describes an access control mechanism that...
What model assigns sensitivity labels to users and their data?
Identify the access control model that makes use of security labels...
Which authentication will provide a username, a password and undergo a...
Which of the following provides the strongest form of authentication?
Why would reusing a ticket as a replay attack in Kerberos not be...
Which access controls are based on security labels assigned to every...
Which services is provided by message authentication codes?
When an attacker captures part of a communication and later sends the...
Which of the following ports does a DNS (Domain Name Service) server...
From a security perspective a performance baseline is MOST useful for:
Which of the following is a characteristic of MAC (Mandatory Access...
Which of the following best describes a challenge-response session?
Which of the following terms represents a MAC (Mandatory Access...
What type of attacks occurs when a rogue application has been planted...
Which of the following attacks could be the most successful when the...
What is a protocol used for carrying authentication, authorization,...
Which of the following access control methods relies on user security...
Which of the following is a drawback of Network-based IDSs?
Which of the following access control methods provides the most...
Identify from the list below the access control models that makes use...
With RBAC, roles are:
With regard to DAC (Discretionary Access Control), which of the...
Which of the following provides the best protection against an...
What technology involves the use of electronic wallet?
All of the following are correct about LDAP EXCEPT:
The Certkiller .com network contains of various departments that makes...
Under MAC, which of the following is true?
Which of the following is an inherent flaw of DAC (Discretionary...
Which of the following must be deployed for Kerberos to function...
Determine the two-factor authentication for an information system?
A firewall can be classified as a:
Which of the following is an example of a task-based control model?
When using network monitoring systems to monitor workstations, which...
You work as the security administrator at Certkiller .com. You set...
Which of the following factors must be considered when implementing...
Covert channel is a communication channel that can be used
...
DAC are characterized by many organizations as:
ActiveX controls can be digitally signed using a technology called:
Which of the following is more of an irritation than a security...
When does CHAP (Challenge Handshake Authentication Protocol) perform...
Which of the following is a feature of the Rule based access control?
In the Lattice Based Access Control model, controls are applied to:
You deploy a biometric authentication system in the Certkiller .com...
Why are non-essential services appealing to attackers? (Choose TWO)
Access controls that are not based on the policy are characterized as:
Which servers should be located on a private network?
Which of the following password management systems is designed to...
Which of the Following is an item most likely to be addressed in an...
Under MAC, a clearance is a
In order to perform a TCP hijacking attack, an attacker would be
...
The majority of commercial intrusion detection systems are:
With Java, what can be embedded in a web browser, allowing programs to...
Which of the following is an effective measure against a certain type...
Which of the following represents the best method for securing a web...
What access control model is a Windows file server an example of?
Which of the following intrusion detection technologies work by...
Which of the following password generators is based on...
What is the access control model that explicitly assigns access rights...
You work as the security administrator at Certkiller .com. You want to...
Which of the following protocols did Microsoft develop for use in...
A passive response is the most common type of response to a number of...
Which of the following are the main components of a Kerberos server?
Identify the different types of certificate-based authentication?...
Which of the following services should be logged for security purpose?
To allow your Windows clients to connect to your Windows NT Server...
In a RADIUS architecture, which of the following acts as a client?
Creating a basic standard for application settings, security settings,...
Which of the following will you consider as clear-text protocols?
Certkiller .com deploy Kerberos authentication on the network. What...
Determine the authentication mechanisms that use key fob based...