With _______________, access decisions are based on the roles that...
Which if the following technologies would you use if you need to...
A smartcard represents:
Identify the process where users can access numerous resources without...
Which of the following is the most costly method of an authentication?
A password represents:
What authentication model uses a smart card and a User ID/Password for...
Determine the access control model where users are assigned access...
For which of the following can biometrics be used?
Identify the authentication system where a unique username and...
A centralized database of remote users for a multi-site network...
An administrator wishes to enable network auditing policies. Which of...
A company creates its own application that accesses the company
...
Which of the following best describes an access control mechanism in...
Why are clocks used in a Kerberos authentication system?
What is based upon an authentication server that allocates tickets to...
All logs are kept on archive for a period of time. What determines...
Which of the following is NOT a good password deployment guideline?
Identify the access control model that makes use of security labels...
Which access controls are based on security labels assigned to every...
Which of the following access control methods allows access control...
What model assigns sensitivity labels to users and their data?
The Certkiller .com network contains of various departments that makes...
Which of the following attacks could be the most successful when the...
You work as the security administrator at Certkiller .com. Certkiller...
Which authentication will provide a username, a password and undergo a...
From a security perspective a performance baseline is MOST useful for:
With regard to DAC (Discretionary Access Control), which of the...
Identify the access decisions based on a Mandatory Access Control...
Enforcing minimum privileges for general system users
...
Which of the following ports does a DNS (Domain Name Service) server...
How many ports in TCP/IP (Transmission Control Protocol/Internet...
Under MAC, which of the following is true?
Which of the following access control methods provides the most...
Which of the following are used to make access decisions in a MAC...
What type of attacks occurs when a rogue application has been planted...
Microsoft supports the _______________ and ______standards for use in...
Identify the method that should be used to ensure that the user is...
Which of the following is a characteristic of MAC (Mandatory Access...
Which of the following must be deployed for Kerberos to function...
Which of the following is an example of a task-based control model?
Which of the following access control methods relies on user security...
Which servers should be located on a private network?
Access controls that are not based on the policy are characterized as:
Which of the following factors must be considered when implementing...
A firewall can be classified as a:
Which services is provided by message authentication codes?
Which of the following provides the best protection against an...
Which of the following is an inherent flaw of DAC (Discretionary...
Which of the following terms represents a MAC (Mandatory Access...
Identify from the list below the access control models that makes use...
Which of the following password management systems is designed to...
When does CHAP (Challenge Handshake Authentication Protocol) perform...
Which of the following is a drawback of Network-based IDSs?
You work as the security administrator at Certkiller .com. You set...
Which of the following represents the best method for securing a web...
In the Lattice Based Access Control model, controls are applied to:
When an attacker captures part of a communication and later sends the...
Determine the two-factor authentication for an information system?
ActiveX controls can be digitally signed using a technology called:
Why are non-essential services appealing to attackers? (Choose TWO)
What is a protocol used for carrying authentication, authorization,...
All of the following are correct about LDAP EXCEPT:
You deploy a biometric authentication system in the Certkiller .com...
Under MAC, a clearance is a
DAC are characterized by many organizations as:
Covert channel is a communication channel that can be used
...
Which of the following are the main components of a Kerberos server?
Which of the following is a feature of the Rule based access control?
In order to perform a TCP hijacking attack, an attacker would be
...
The majority of commercial intrusion detection systems are:
What technology involves the use of electronic wallet?
You work as the security administrator at Certkiller .com. You want to...
Which of the following is an effective measure against a certain type...
What access control model is a Windows file server an example of?
Which of the following services should be logged for security purpose?
Which of the following password generators is based on...
With Java, what can be embedded in a web browser, allowing programs to...
Which of the following intrusion detection technologies work by...
Which of the following is NOT a common type of malware?
Creating a basic standard for application settings, security settings,...
What is the access control model that explicitly assigns access rights...
Identify the different types of certificate-based authentication?...
Which of the following will you consider as clear-text protocols?
In a RADIUS architecture, which of the following acts as a client?
Which of the following protocols did Microsoft develop for use in...
Determine the authentication mechanisms that use key fob based...
To allow your Windows clients to connect to your Windows NT Server...
Certkiller .com deploy Kerberos authentication on the network. What...