This IEEE quiz evaluates knowledge on network security protocols and standards, including RADIUS, LDAP, and IEEE 802.1x. It tests understanding of AAA elements, Kerberos authentication, and the identification process in access control, essential for professionals in IT security.
Controlling access to network resources (authentication)
Enforcing security policies (authorization)
Determining user need (analyzing)
Auditing usage (accounting)
Rate this question:
RDAP
DAP
RADIUS
AAA
Rate this question:
IEEE 802.1x
RADIUS
Kerberos
LDAP
Rate this question:
DAP
LDAP
IEEE X.501
Lite RDAP
Rate this question:
Authentication
Identification
Authorization
Access
Rate this question:
Object
Subject
Resource
Operation check
Rate this question:
Supervisor
Owner
Custodian
Manager
Rate this question:
Discretionary Access Control
Security Access Control
Mandatory Access Control
Restricted Access Control
Rate this question:
Is considered obsolete today
Dynamically assigns roles to subjects based on rules
Is considered a real-world approach by linking a user’s job function with security
Requires that a custodian set all rules
Rate this question:
Processes should be divided between two or more individuals
End users cannot set security for themselves
Managers must monitor owners for security purposes
Jobs be rotated among different individuals
Rate this question:
Denial of duties
Implicit deny
Explicit rejection
Prevention control
Rate this question:
Access control list (ACL)
Subject Access Entity (SAE)
Object modifier
Security entry designator
Rate this question:
Windows Register Settings
Group Policy
Resource Allocation Entities
AD Management Services (ADMS)
Rate this question:
SQL/LDAP insert attack
Modified Trojan attack
LDAP injection attack
RBASE plug-in attack
Rate this question:
Role Based Access Control (RBAC)
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Rule Based Access Control (RBAC)
Rate this question:
Enterprise Security
Least privilege
Deny all
Mandatory Limitations
Rate this question:
Owner
Custodian
End user
Administrator
Rate this question:
Is restricted and cannot be accessed
Is assigned a label
Can be changed by the owner
Must be given a number from 200–900
Rate this question:
Orphaned
Limbo
Static
Dormant
Rate this question:
What you have
What you are
What you discover
What you know
Rate this question:
A lengthy and complex password can be difficult to memorize.
A security policy requires a password to be changed regularly.
Having multiple passwords makes it hard to remember all of them.
Most sites force users to create weak passwords although they do not want to.
Rate this question:
Resetting
Capturing
Social engineering
Online guessing
Rate this question:
An attack that combines a dictionary attack with an online guessing attack
A brute force attack that uses special tables
An attack that slightly alters dictionary words
An attack that uses both automated and user input
Rate this question:
Use a short password so the computer can process it more quickly
Avoid using phonetic words
Do not use sequences
Do not use personal information
Rate this question:
For as long as it appears on the device
For up to 1 hour
Only for the user who possesses the device
If it is longer than 8 characters
Rate this question:
Single-factor authentication system
Dual-prong verification system
Multi-factor authentication system
Token-passing authentication system
Rate this question:
Personal Identity Verification (PIV) card
Government Smart Card (GSC)
Secure ID Card (SIDC)
Common Access Card (CAC)
Rate this question:
Resource
Cognitive
Adaptive
Behavioral
Rate this question:
Time-Location Resource Monitoring (TLRM)
Keystroke dynamics
Cognitive biometrics
Computer footprinting
Rate this question:
SSO Login Resource (SSO-LR)
Windows CardSpace
OpenID
Windows Live ID
Rate this question:
Face
Weight
Fingerprint
Retina
Rate this question:
Standard
Intelligent
Behavioral
Cognitive
Rate this question:
Credentialization
Identification authentication
Single sign-on
Federal login
Rate this question:
Speed
Size
Cost
Standards
Rate this question:
OAuth
CardSpace
OpenID
All SSO technologies use tokens.
Rate this question:
It could decrease calls to the help desk.
Because the network administrator would then have to manually reset the account.
So the user would not have to wait too long to have their password reset.
It could result in denial of service (DoS) attacks.
Rate this question:
Operating systems by default use the principle of least privilege.
Operating systems are complex programs with millions of lines of code that make vulnerabilities extremely difficult to recognize.
Operating systems do not isolate applications from each another so that one application that is compromised can impact the entire computer.
Operating systems cannot create a trusted path between users and applications.
Rate this question:
Secure OS
Trustworthy OS
Managed OS
Trusted OS
Rate this question:
Computer footprinting
OpenAuthorization
Cognitive biometrics
Internet Throttling
Rate this question:
Plaintext
Cleartext
Opentext
Ciphertext
Rate this question:
Confidentiality
Stop loss
Integrity
Authenticity
Rate this question:
In data that is used to describe the content or structure of the actual data
In the directory structure of the file system
In the file header fields that describe the file
In areas that contain the content data itself
Rate this question:
Repudiation
Integrity
Non-repudiation
Availability
Rate this question:
Private key cryptography
Cipherkey cryptography
Public/private key cryptography
Public key cryptography
Rate this question:
Stream
Hash
Algorithm
Key
Rate this question:
Collisions should be rare
The results of a hash function should not be reversed
The hash should always be the same fixed size
A message cannot be produced from a predefined hash
Rate this question:
Bank automatic teller machine (ATM)
Encrypting and decrypting e-mail attachments
Verifying a user password entered on a Linux system
Determining the integrity of a message
Rate this question:
Key_hash
WEP
MDRIPE
Hashed Message Authentication Code (HMAC)
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.