Security + Access Control

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Joelcg
J
Joelcg
Community Contributor
Quizzes Created: 5 | Total Attempts: 5,427
| Attempts: 1,041 | Questions: 34
Please wait...
Question 1 / 34
0 %
0/100
Score 0/100
1. Which access control model allows a user to act in a certain predetermined manner based on the role the user holds in the organization?

Explanation

The Role-Based Access Control (RBAC) model allows a user to act in a certain predetermined manner based on the role the user holds in the organization. The Mandatory Access Control (MAC) model is a static model that uses a predefined set of access privileges to files on the system. The Discretionary Access Control (DAC) model allows the owner of a resource to establish privileges to the information they own and has nonmandatory labels. SAC is not a valid access control model.

Submit
Please wait...
About This Quiz
Security Plus Quizzes & Trivia

This SECURITY + Access Control quiz evaluates knowledge on various access control models and authentication protocols, including DAC, MAC, PAP, Kerberos, and CHAP. It tests understanding of security... see moremechanisms and threats like snooping, essential for anyone preparing for security certifications. see less

2. Which of the following is not a valid access control model?

Explanation

BAC is not a valid access control model. The Discretionary Access Control (DAC) model allows the owner of a resource to establish privileges to the information they own and has nonmandatory labels. The Mandatory Access Control (MAC) model is a static model that uses a predefined set of access privileges to files on the system. The Role-Based Access Control (RBAC) model allows a user to act in a certain predetermined manner based on the role the user holds in the organization.

Submit
3. Which access control model allows the owner of a resource to establish privileges to the information they own and has nonmandatory labels?

Explanation

The Discretionary Access Control (DAC) model allows the owner of a resource to establish privileges to the information they own and has nonmandatory labels. The Mandatory Access Control (MAC) model is a static model that uses a predefined set of access privileges to files on the system. The Role-Based Access Control (RBAC) model allows a user to act in a certain predetermined manner based on the role the user holds in the organization. BAC is not a valid access control model.

Submit
4. Which of the following sends a message from a single system to the entire network?

Explanation

A broadcast sends a message from a single system to the entire network. A multicast sends a message to multiple addresses. A unicast is multicast formatted but oriented at a single system. There is no such valid messaging option as sudocast.

Submit
5. Which access control model is a static model that uses a predefined set of access privileges to files on the system?

Explanation

The Mandatory Access Control (MAC) model is a static model that uses a predefined set of access privileges to files on the system. The Discretionary Access Control (DAC) model allows the owner of a resource to establish privileges to the information they own and has nonmandatory labels. The Role-Based Access Control (RBAC) model allows a user to act in a certain predetermined manner based on the role the user holds in the organization. BRACK is not a valid access control model.

Submit
6. Which of the following access attacks amounts to someone looking through your files in hopes of finding something interesting?

Explanation

All the choices listed are various types of access attacks. In a snooping attack, someone looks through your files in hopes of finding something interesting. In an eavesdropping attack, the attacker listens in on or overhears parts of a conversation. In a passive interception attack, someone routinely monitors network traffic. In an active interception attack, a computer is placed between the sender and receiver to capture information while it's sent.

Submit
7. Which of the following authentication protocols challenges a system to verify identity and employs an encrypted challenge?

Explanation

Challenge Handshake Authentication Protocol (CHAP) challenges a system to verify identity and employs an encrypted challenge. Security tokens are forms of certificates that contain rights and access privileges of a token bearer as part of their token. Password Authentication Protocol (PAP) offers no true security and is one of the simplest forms of authentication: both the username and the password are sent as clear text and checked for a match. Kerberos authenticates a principal (user, system, program, and so on) and provides it with a ticket.

Submit
8. RADIUS should be used to improve security by adding a single authentication service for which type of users?

Explanation

Remote Authentication Dial-In User Service (RADIUS) is used to authenticate users who connect remotely.

Submit
9. Which of the following is an implementation of X.500 that operates on port 389?

Explanation

Lightweight Directory Access Protocol (LDAP) is a pared-down X.500 implementation that operates on port 389. The other choices are not valid for this question.

Submit
10. Which protocol is used to manage and monitor devices in a network?

Explanation

Simple Network Management Protocol (SNMP) is used to manage and monitor devices in a network. Internet Control Message Protocol (ICMP) is used to report errors and reply to requests from programs such as ping and traceroute. Internet Group Management Protocol (IGMP) is used to manage group or multicasting sessions. Trivial File Transfer Protocol (TFTP) is an anonymous version of FTP.

Submit
11. Which of the following authentication protocols authenticates a principal (user, system, program, and so on) and provides it with a ticket?

Explanation

Kerberos authenticates a principal (user, system, program, and so on) and provides it with a ticket. Challenge Handshake Authentication Protocol (CHAP) challenges a system to verify identity and employs an encrypted challenge. Security tokens are forms of certificates that contain rights and access privileges of a token bearer as part of their token. Password Authentication Protocol (PAP) offers no true security and is one of the simplest forms of authentication: both the username and the password are sent as clear text and checked for a match.

Submit
12. Which of the following authentication protocols is the simplest?

Explanation

Password Authentication Protocol (PAP) offers no true security and is one of the simplest forms of authentication: both the username and the password are sent as clear text and checked for a match. Challenge Handshake Authentication Protocol (CHAP) challenges a system to verify identity and employs an encrypted challenge. Security tokens are forms of certificates that contain rights and access privileges of a token bearer as part of their token. Kerberos authenticates a principal (user, system, program, and so on) and provides it with a ticket.

Submit
13. Which of the following is used to transport NetBIOS across the LAN?

Explanation

NetBIOS Extended User Interface (NetBEUI) is used to transport NetBIOS across the LAN. Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a networking protocol proprietary to Novell that was used with NetWare 4.x and earlier versions. Network Basic Input Output System (NetBIOS) is the native networking protocol of Windows-based PCs, and WINS (Windows Internet Name Service) is used to translate NetBIOS names to network addresses. Network File System (NFS) is the default file-sharing protocol for Unix-based systems.

Submit
14. Which port does TACACS use?

Explanation

TACACS uses port 49. POP3 uses port 110. NNTP uses port 119. NetBIOS uses port 138 (as well as 137 and 139).

Submit
15. Which of the following is the native networking protocol of Windows-based PCs?

Explanation

Network Basic Input Output System (NetBIOS) is the native networking protocol of Windows-based PCs. Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a networking protocol proprietary to Novell that was used with NetWare 4.x and earlier versions. NetBIOS Extended User Interface (NetBEUI) is used to transport NetBIOS across the LAN. Network File System (NFS) is the default file-sharing protocol for Unix-based systems.

Submit
16. Which of the following network protocols was proprietary and used in Novell NetWare prior to version 5?

Explanation

Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a networking protocol proprietary to Novell that was used with NetWare 4.x and earlier versions. Network Basic Input Output System (NetBIOS) was the native networking protocol of Windows-based PCs prior to TCP/IP. NetBIOS Extended User Interface (NetBEUI) is used to transport NetBIOS across the LAN. Network File System (NFS) is the default file-sharing protocol for Unix-based systems.

Submit
17. RAS connections can be made using modems and what else?

Explanation

RAS connections can be made using modems and Plain Old Telephone Service (POTS).

Submit
18. Which of the following LDAP/Active Directory names is a distinguished name given in a top-down notation?

Explanation

The canonical name (CN) is the distinguished name given in a top-down notation. The relative distinguished name (RDN) is the portion of the name that is unique within the container. The user principal name (UPN) consists of the user account and the user's domain name and is often referred to as the friendly name. The other option is not a valid choice for a type of LDAP/Active Directory name.

Submit
19. Virtual private networks (VPNs) employ tunneling at which layer of the OSI model?

Explanation

VPNs employ tunneling at layer 2 of the OSI model.

Submit
20. You want to configure your firewall to block all NetBIOS traffic. Which port(s) should you block? (Choose all that apply.)

Explanation

The NetBIOS session service uses ports 137, 138, and 139. Port 140 is not used by NetBIOS.

Submit
21. What type of access control device can include a scale to weigh the person before allowing them entry?

Explanation

A mantrap can incorporate scales to weigh the individual and make certain no one is sneaking in with them.

Submit
22. What is the acronym used for the Remote Access Service (RAS) in the current Microsoft Windows operating systems?

Explanation

In the current Microsoft Windows operating systems, RAS is known as Routing and Remote Access Service (RRAS). The other choices are not valid.

Submit
23. Which port does NNTP use?

Explanation

NNTP uses port 119. TACACS uses port 49. POP3 uses port 110. NetBIOS uses port 138 (as well as 137 and 139).

Submit
24. You want to prevent users from being able to change configuration settings in their Windows-based operating system. Which of the following will allow you to disable the ability of users from accessing these settings?

Explanation

Group policies can be used to prevent users from making configuration settings to their operating system for Windows-based operating systems.

Submit
25. Which of the following is the Novell directory management service that replaced the bindery?

Explanation

The Novell bindery was replaced by NetWare/Novell Directory Service (NDS). NDS was replaced by eDirectory.

Submit
26. You have chosen to specifically name certain users who cannot access server resources while all other users can access those resources. What is this type of access control known as?

Explanation

With implicit deny, you deny access to named users. All other users-those not appearing in the deny list-are granted access to the resources.

Submit
27. Which of the following is the Novell directory management service that replaced NDS?

Explanation

NDS was replaced by eDirectory. The Novell bindery was replaced by NetWare/Novell Directory Service (NDS).

Submit
28. Which of the following is not a Microsoft protocol?

Explanation

Network File System (NFS) is the default file-sharing protocol for Unix-based systems. Network Basic Input Output System (NetBIOS) is the native networking protocol of Windows-based PCs. NetBIOS Extended User Interface (NetBEUI) is used to transport NetBIOS across the LAN. Windows Internet Naming Service (WINS) translates NetBIOS names to TCP/IP addresses.

Submit
29. Which of the following is the portion of the name that is unique within the container?

Explanation

The relative distinguished name (RDN) is the portion of the name that is unique within the container. The canonical name (CN) is the distinguished name given in a top-down notation. The user principal name (UPN) consists of the user account and the user's domain name and is often referred to as the friendly name. The domain name (DN) exists for every object in Active Directory and must be unique; it is the full path of the object, including any containers.

Submit
30. Which of the following is often referred to as the friendly name?

Explanation

The user principal name (UPN) consists of the user account and the user's domain name and is often referred to as the friendly name. The relative distinguished name (RDN) is the portion of the name that is unique within the container. The canonical name (CN) is the distinguished name given in a top-down notation. The domain name (DN) exists for every object in Active Directory and must be unique; it is the full path of the object, including any containers.

Submit
31. Which of the following exists for every object in Active Directory and must be unique?

Explanation

The domain name (DN) exists for every object in Active Directory and must be unique; it is the full path of the object, including any containers. The relative distinguished name (RDN) is the portion of the name that is unique within the container. The user principal name (UPN) consists of the user account and the user's domain name and is often referred to as the friendly name. The canonical name (CN) is the distinguished name given in a top-down notation.

Submit
32. You have been instructed by your boss to block all LDAP traffic, with and without SSL. Which port(s) should you block? (Choose all that apply.)

Explanation

LDAP uses port 389. LDAP with SSL uses port 626. IMAP uses port 143. HTTPS uses port 443.

Submit
33. You want to harden your IIS web server (named blackwater) by placing stricter permissions on all anonymous users. Which user account should you place stricter permissions on?

Explanation

With IIS, the anonymous account is IUSR_computername, which becomes IUSR_blackwater in this case. The other options are incorrect.

Submit
34. What abbreviation is used in most PBX diagrams to signify the phone company?

Explanation

The telephone company is always abbreviated as the central office (CO). Connections to the CO are often done through T1 and T3 lines.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 01, 2011
    Quiz Created by
    Joelcg
Cancel
  • All
    All (34)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which access control model allows a user to act in a certain ...
Which of the following is not a valid access control model?
Which access control model allows the owner of a resource to establish...
Which of the following sends a message from a single system to the...
Which access control model is a static model that uses a predefined...
Which of the following access attacks amounts to someone looking...
Which of the following authentication protocols challenges a system to...
RADIUS should be used to improve security by adding a single...
Which of the following is an implementation of X.500 that operates on...
Which protocol is used to manage and monitor devices in a network?
Which of the following authentication protocols authenticates a ...
Which of the following authentication protocols is the simplest?
Which of the following is used to transport NetBIOS across the LAN?
Which port does TACACS use?
Which of the following is the native networking protocol of...
Which of the following network protocols was proprietary and used in...
RAS connections can be made using modems and what else?
Which of the following LDAP/Active Directory names is a distinguished...
Virtual private networks (VPNs) employ tunneling at which layer of the...
You want to configure your firewall to block all NetBIOS traffic....
What type of access control device can include a scale to weigh the...
What is the acronym used for the Remote Access Service (RAS) in the...
Which port does NNTP use?
You want to prevent users from being able to change configuration ...
Which of the following is the Novell directory management service that...
You have chosen to specifically name certain users who cannot access ...
Which of the following is the Novell directory management service that...
Which of the following is not a Microsoft protocol?
Which of the following is the portion of the name that is unique...
Which of the following is often referred to as the friendly name?
Which of the following exists for every object in Active Directory and...
You have been instructed by your boss to block all LDAP traffic, with...
You want to harden your IIS web server (named blackwater) by placing...
What abbreviation is used in most PBX diagrams to signify the phone...
Alert!

Advertisement