Security + Access Control

34 Questions | Total Attempts: 127

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Access Control


Questions and Answers
  • 1. 
    Which access control model allows the owner of a resource to establish privileges to the information they own and has nonmandatory labels?
    • A. 

      DAC

    • B. 

      MAC

    • C. 

      RBAC

    • D. 

      BAC

  • 2. 
    Which of the following authentication protocols is the simplest?
    • A. 

      CHAP

    • B. 

      Security token

    • C. 

      PAP

    • D. 

      Kerberos

  • 3. 
    Which access control model is a static model that uses a predefined set of access privileges to files on the system?
    • A. 

      DAC

    • B. 

      MAC

    • C. 

      RBAC

    • D. 

      BRACK

  • 4. 
    Which of the following authentication protocols authenticates a principal (user, system, program, and so on) and provides it with a ticket?
    • A. 

      CHAP

    • B. 

      Security token

    • C. 

      PAP

    • D. 

      Kerberos

  • 5. 
    Which of the following authentication protocols challenges a system to verify identity and employs an encrypted challenge?
    • A. 

      CHAP

    • B. 

      Security token

    • C. 

      PAP

    • D. 

      Kerberos

  • 6. 
    Which of the following access attacks amounts to someone looking through your files in hopes of finding something interesting?
    • A. 

      Snooping

    • B. 

      Passive interception

    • C. 

      Eavesdropping

    • D. 

      Active interception

  • 7. 
    Which of the following is not a valid access control model?
    • A. 

      DAC

    • B. 

      MAC

    • C. 

      RBAC

    • D. 

      BAC

  • 8. 
    Which access control model allows a user to act in a certain predetermined manner based on the role the user holds in the organization?
    • A. 

      DAC

    • B. 

      MAC

    • C. 

      RBAC

    • D. 

      SAC

  • 9. 
    Which of the following is an implementation of X.500 that operates on port 389?
    • A. 

      X.502

    • B. 

      LDAP

    • C. 

      XNS

    • D. 

      XML

  • 10. 
    Which of the following exists for every object in Active Directory and must be unique?
    • A. 

      RDN

    • B. 

      CN

    • C. 

      UPN

    • D. 

      DN

  • 11. 
    Which of the following is not a Microsoft protocol?
    • A. 

      NFS

    • B. 

      NetBIOS

    • C. 

      NetBEUI

    • D. 

      WINS

  • 12. 
    Which of the following is the portion of the name that is unique within the container?
    • A. 

      RDN

    • B. 

      CN

    • C. 

      UPN

    • D. 

      DN

  • 13. 
    Which of the following is often referred to as the friendly name?
    • A. 

      RDN

    • B. 

      CN

    • C. 

      UPN

    • D. 

      DN

  • 14. 
    Which of the following LDAP/Active Directory names is a distinguished name given in a top-down notation?
    • A. 

      RDN

    • B. 

      CN

    • C. 

      UPN

    • D. 

      NDP

  • 15. 
    Which of the following is the Novell directory management service that replaced NDS?
    • A. 

      DNS

    • B. 

      EDirectory

    • C. 

      ZENworks

    • D. 

      Registry

  • 16. 
    Which of the following is the native networking protocol of Windows-based PCs?
    • A. 

      IPX/SPX

    • B. 

      NetBIOS

    • C. 

      NetBEUI

    • D. 

      NFS

  • 17. 
    Which protocol is used to manage and monitor devices in a network?
    • A. 

      SNMP

    • B. 

      ICMP

    • C. 

      IGMP

    • D. 

      TFTP

  • 18. 
    Which of the following network protocols was proprietary and used in Novell NetWare prior to version 5?
    • A. 

      IPX/SPX

    • B. 

      NetBIOS

    • C. 

      NetBEUI

    • D. 

      NFS

  • 19. 
    Which of the following is the Novell directory management service that replaced the bindery?
    • A. 

      NDS

    • B. 

      EDirectory

    • C. 

      ZENworks

    • D. 

      Registry

  • 20. 
    Which of the following is used to transport NetBIOS across the LAN?
    • A. 

      IPX/SPX

    • B. 

      WINS

    • C. 

      NetBEUI

    • D. 

      NFS

  • 21. 
    Which of the following sends a message from a single system to the entire network?
    • A. 

      Broadcast

    • B. 

      Multicast

    • C. 

      Unicast

    • D. 

      Sudocast

  • 22. 
    What is the acronym used for the Remote Access Service (RAS) in the current Microsoft Windows operating systems?
    • A. 

      SAR

    • B. 

      RAS2

    • C. 

      RRAS

    • D. 

      RASTER

  • 23. 
    Which port does NNTP use?
    • A. 

      49

    • B. 

      110

    • C. 

      119

    • D. 

      138

  • 24. 
    RAS connections can be made using modems and what else?
    • A. 

      POX

    • B. 

      CO

    • C. 

      POTS

    • D. 

      SOX

  • 25. 
    What abbreviation is used in most PBX diagrams to signify the phone company?
    • A. 

      CO

    • B. 

      POTS

    • C. 

      PC

    • D. 

      PBX-Main

Back to Top Back to top