With _______________, access decisions are based on the roles that...
Which of the following is NOT a valid access control mechanism?
A smartcard represents:
A password represents:
Which if the following technologies would you use if you need to...
For which of the following can biometrics be used?
Identify the authentication system where a unique username and...
Identify the process where users can access numerous resources without...
All logs are kept on archive for a period of time. What determines...
An administrator wishes to enable network auditing policies. Which of...
Which of the following best describes an access control mechanism in...
Which of the following are used to make access decisions in a MAC...
A centralized database of remote users for a multi-site network...
What authentication model uses a smart card and a User ID/Password for...
Least privilege is defined as giving access to information:
You work as the security administrator at Certkiller .com. Certkiller...
Why are clocks used in a Kerberos authentication system?
Which of the following is the most costly method of an authentication?
Which of the following is NOT a good password deployment guideline?
A company creates its own application that accesses the company
...
Which of the following access control methods allows access control...
Determine the access control model where users are assigned access...
Identify the method that should be used to ensure that the user is...
With Discretionary access controls, who determines who has access and...
What is based upon an authentication server that allocates tickets to...
Enforcing minimum privileges for general system users
...
Microsoft supports the _______________ and ______standards for use in...
Which of the following best describes an access control mechanism that...
Identify the access decisions based on a Mandatory Access Control...
What model assigns sensitivity labels to users and their data?
How many ports in TCP/IP (Transmission Control Protocol/Internet...
Which access controls are based on security labels assigned to every...
Which of the following provides the strongest form of authentication?
Which services is provided by message authentication codes?
When an attacker captures part of a communication and later sends the...
Why would reusing a ticket as a replay attack in Kerberos not be...
Which of the following ports does a DNS (Domain Name Service) server...
Which of the following is a characteristic of MAC (Mandatory Access...
Identify the access control model that makes use of security labels...
Which authentication will provide a username, a password and undergo a...
Which of the following best describes a challenge-response session?
What type of attacks occurs when a rogue application has been planted...
Which of the following attacks could be the most successful when the...
From a security perspective a performance baseline is MOST useful for:
Which of the following is a drawback of Network-based IDSs?
Which of the following access control methods provides the most...
Which of the following terms represents a MAC (Mandatory Access...
Identify from the list below the access control models that makes use...
What is a protocol used for carrying authentication, authorization,...
With regard to DAC (Discretionary Access Control), which of the...
Which of the following access control methods relies on user security...
With RBAC, roles are:
Under MAC, which of the following is true?
Which of the following is an inherent flaw of DAC (Discretionary...
The Certkiller .com network contains of various departments that makes...
Which of the following provides the best protection against an...
A firewall can be classified as a:
What technology involves the use of electronic wallet?
All of the following are correct about LDAP EXCEPT:
When using network monitoring systems to monitor workstations, which...
You work as the security administrator at Certkiller .com. You set...
Which of the following is an example of a task-based control model?
Which of the following must be deployed for Kerberos to function...
Determine the two-factor authentication for an information system?
Which of the following is more of an irritation than a security...
Which of the following factors must be considered when implementing...
Covert channel is a communication channel that can be used
...
DAC are characterized by many organizations as:
You deploy a biometric authentication system in the Certkiller .com...
Which of the following is a feature of the Rule based access control?
In the Lattice Based Access Control model, controls are applied to:
Access controls that are not based on the policy are characterized as:
ActiveX controls can be digitally signed using a technology called:
Which servers should be located on a private network?
When does CHAP (Challenge Handshake Authentication Protocol) perform...
Why are non-essential services appealing to attackers? (Choose TWO)
Which of the following password management systems is designed to...
Which of the Following is an item most likely to be addressed in an...
Under MAC, a clearance is a
The majority of commercial intrusion detection systems are:
In order to perform a TCP hijacking attack, an attacker would be
...
What access control model is a Windows file server an example of?
Which of the following is an effective measure against a certain type...
With Java, what can be embedded in a web browser, allowing programs to...
Which of the following represents the best method for securing a web...
Which of the following intrusion detection technologies work by...
Which of the following password generators is based on...
What is the access control model that explicitly assigns access rights...
Which of the following protocols did Microsoft develop for use in...
You work as the security administrator at Certkiller .com. You want to...
A passive response is the most common type of response to a number of...
Which of the following are the main components of a Kerberos server?
Identify the different types of certificate-based authentication?...
To allow your Windows clients to connect to your Windows NT Server...
Which of the following services should be logged for security purpose?
In a RADIUS architecture, which of the following acts as a client?
Which of the following will you consider as clear-text protocols?
Creating a basic standard for application settings, security settings,...
Certkiller .com deploy Kerberos authentication on the network. What...
Determine the authentication mechanisms that use key fob based...