Which if the following technologies would you use if you need to...
For which of the following can biometrics be used?
With _______________, access decisions are based on the roles that...
A password represents:
A smartcard represents:
You work as the security administrator at Certkiller .com. Certkiller...
What type of attacks occurs when a rogue application has been planted...
An administrator wishes to enable network auditing policies. Which of...
Microsoft supports the _______________ and ______standards for use in...
Which of the following is NOT a valid access control mechanism?
Which of the following attacks could be the most successful when the...
Which of the following is an example of a task-based control model?
Which of the following is the most costly method of an authentication?
Which of the following best describes an access control mechanism in...
Which of the following provides the best protection against an...
A centralized database of remote users for a multi-site network...
From a security perspective a performance baseline is MOST useful for:
Why are clocks used in a Kerberos authentication system?
With Discretionary access controls, who determines who has access and...
Enforcing minimum privileges for general system users
...
Which of the following is NOT a good password deployment guideline?
Identify the process where users can access numerous resources without...
A firewall can be classified as a:
ActiveX controls can be digitally signed using a technology called:
Access controls that are not based on the policy are characterized as:
What is a protocol used for carrying authentication, authorization,...
All logs are kept on archive for a period of time. What determines...
Which of the following is an inherent flaw of DAC (Discretionary...
Identify the access control model that makes use of security labels...
Which of the following ports does a DNS (Domain Name Service) server...
Identify the access decisions based on a Mandatory Access Control...
A company creates its own application that accesses the company
...
The Certkiller .com network contains of various departments that makes...
Which servers should be located on a private network?
When an attacker captures part of a communication and later sends the...
Determine the access control model where users are assigned access...
Under MAC, a clearance is a
Least privilege is defined as giving access to information:
You work as the security administrator at Certkiller .com. You set...
Which access controls are based on security labels assigned to every...
Under MAC, which of the following is true?
When using network monitoring systems to monitor workstations, which...
Which authentication will provide a username, a password and undergo a...
How many ports in TCP/IP (Transmission Control Protocol/Internet...
Why are non-essential services appealing to attackers? (Choose TWO)
With RBAC, roles are:
What access control model is a Windows file server an example of?
Which of the following provides the strongest form of authentication?
Why would reusing a ticket as a replay attack in Kerberos not be...
What authentication model uses a smart card and a User ID/Password for...
Identify the method that should be used to ensure that the user is...
You deploy a biometric authentication system in the Certkiller .com...
Which of the following is an effective measure against a certain type...
Which of the following are used to make access decisions in a MAC...
Which of the following best describes an access control mechanism that...
Which of the following must be deployed for Kerberos to function...
In the Lattice Based Access Control model, controls are applied to:
Which of the following access control methods allows access control...
Which of the following factors must be considered when implementing...
When does CHAP (Challenge Handshake Authentication Protocol) perform...
Identify the authentication system where a unique username and...
Which of the following protocols did Microsoft develop for use in...
What technology involves the use of electronic wallet?
Which of the following password generators is based on...
Which of the following password management systems is designed to...
The majority of commercial intrusion detection systems are:
To allow your Windows clients to connect to your Windows NT Server...
Which of the following intrusion detection technologies work by...
Which of the following access control methods provides the most...
What is based upon an authentication server that allocates tickets to...
Which of the following is a feature of the Rule based access control?
A passive response is the most common type of response to a number of...
Covert channel is a communication channel that can be used
...
Which of the following services should be logged for security purpose?
In a RADIUS architecture, which of the following acts as a client?
Which of the following is a drawback of Network-based IDSs?
With Java, what can be embedded in a web browser, allowing programs to...
With regard to DAC (Discretionary Access Control), which of the...
What model assigns sensitivity labels to users and their data?
Which services is provided by message authentication codes?
Determine the authentication mechanisms that use key fob based...
Which of the Following is an item most likely to be addressed in an...
You work as the security administrator at Certkiller .com. You want to...
DAC are characterized by many organizations as:
Which of the following terms represents a MAC (Mandatory Access...
Determine the two-factor authentication for an information system?
Creating a basic standard for application settings, security settings,...
Identify from the list below the access control models that makes use...
Which of the following best describes a challenge-response session?
Which of the following represents the best method for securing a web...
Which of the following is more of an irritation than a security
...
All of the following are correct about LDAP EXCEPT:
In order to perform a TCP hijacking attack, an attacker would be
...
Which of the following access control methods relies on user security...
Which of the following is a characteristic of MAC (Mandatory Access...
Which of the following are the main components of a Kerberos server?
Identify the different types of certificate-based authentication?...
Certkiller .com deploy Kerberos authentication on the network. What...
Which of the following will you consider as clear-text protocols?
What is the access control model that explicitly assigns access rights...