A smartcard represents:
Which of the following is NOT a valid access control mechanism?
An administrator wishes to enable network auditing policies. Which of...
With _______________, access decisions are based on the roles that...
Which if the following technologies would you use if you need to...
You work as the security administrator at Certkiller .com. Certkiller...
Identify the access control model that makes use of security labels...
A password represents:
For which of the following can biometrics be used?
Which of the following best describes an access control mechanism in...
Which of the following best describes a challenge-response session?
Determine the access control model where users are assigned access...
What authentication model uses a smart card and a User ID/Password for...
Identify the process where users can access numerous resources without...
Least privilege is defined as giving access to information:
What is based upon an authentication server that allocates tickets to...
Which of the following access control methods allows access control...
Identify the access decisions based on a Mandatory Access Control...
What model assigns sensitivity labels to users and their data?
Why are clocks used in a Kerberos authentication system?
Which of the following is the most costly method of an authentication?
What type of attacks occurs when a rogue application has been planted...
With regard to DAC (Discretionary Access Control), which of the...
What is a protocol used for carrying authentication, authorization,...
The Certkiller .com network contains of various departments that makes...
Why would reusing a ticket as a replay attack in Kerberos not be...
Which of the following best describes an access control mechanism that...
Which of the following provides the strongest form of authentication?
A centralized database of remote users for a multi-site network...
Which of the following access control methods provides the most...
Which of the following is a characteristic of MAC (Mandatory Access...
Enforcing minimum privileges for general system users can be easily...
All logs are kept on the archive for a period of time. What determines...
From a security perspective a performance baseline is MOST useful for:
Which servers should be located on a private network?
Identify the method that should be used to ensure that the user is...
Under MAC, a clearance is a
Which of the following is NOT a good password deployment guideline?
A company creates its own application that accesses the company
...
Which access controls are based on security labels assigned to every...
Identify the authentication system where a unique username and...
Which of the following terms represents a MAC (Mandatory Access...
How many ports in TCP/IP (Transmission Control Protocol/Internet...
Which of the following is a drawback of Network-based IDSs?
All of the following are correct about LDAP EXCEPT:
Which of the following password management systems is designed to...
When does CHAP (Challenge Handshake Authentication Protocol) perform...
With Discretionary access controls, who determines who has access and...
Access controls that are not based on the policy are characterized as:
Under MAC, which of the following is true?
Which of the following access control methods relies on user security...
Which of the following ports does a DNS (Domain Name Service) server...
A firewall can be classified as a:
Which of the following attacks could be the most successful when the...
Which of the following is an inherent flaw of DAC (Discretionary...
Which authentication will provide a username, a password, and undergo...
Which of the following provides the best protection against an...
Which of the following is a feature of the Rule based access control?
Identify from the list below the access control models that makes use...
Which of the following factors must be considered when implementing...
Which of the following services should be logged for security...
DAC are characterized by many organizations as:
Which of the following are used to make access decisions in a MAC...
Which services is provided by message authentication codes?
Determine the two-factor authentication for an information system?
Microsoft supports the _______________ and ______standards for use in...
In order to perform a TCP hijacking attack, an attacker would be
...
Covert channel is a communication channel that can be used for:
You work as the security administrator at Certkiller .com. You set...
Which of the following is an example of a task-based control model?
Which of the following must be deployed for Kerberos to function...
With RBAC, roles are:
In the Lattice Based Access Control model, controls are applied to:
ActiveX controls can be digitally signed using a technology called:
When an attacker captures part of a communication and later sends the...
You deploy a biometric authentication system in the Certkiller .com...
What technology involves the use of electronic wallet?
Which of the following password generators is based on...
Which of the following will you consider as clear-text protocols?
Which of the following are the main components of a Kerberos server?
Which of the following is an item most likely to be addressed in an...
What access control model is a Windows file server an example of?
Which of the following is an effective measure against a certain type...
In a RADIUS architecture, which of the following acts as a client?
When using network monitoring systems to monitor workstations, which...
Which of the following represents the best method for securing a web...
Which of the following is more of an irritation than a security
...
Which of the following intrusion detection technologies work by...
What is the access control model that explicitly assigns access rights...
The majority of commercial intrusion detection systems are:
With Java, what can be embedded in a web browser, allowing programs to...
You work as the security administrator at Certkiller .com. You want to...
Why are non-essential services appealing to attackers?
Creating a basic standard for application settings, security settings,...
A passive response is the most common type of response to a number of...
To allow your Windows clients to connect to your Windows NT Server...
Which of the following protocols did Microsoft develop for use in...
Identify the different types of certificate-based authentication?...
Determine the authentication mechanisms that use key fob based...
Certkiller .com deploy Kerberos authentication on the network. What...