Ovido
Language
  • English
  • Spanish
  • French
  • Portuguese
  • German
  • Italian
  • Dutch
  • Swedish
Text
  • Uppercase

User

  • Log in
  • Create account
  • Upgrade to Premium
Ovido
  • Home
  • Log in
  • Create account

cyber security chapter 11

Which of the following aims to support distributed authentication and authorization over the Internet?

Federation services

Transitivity is what determines if a trust is allowed to extend outside the two domains between which a trust was formulated. In Windows network, transitive trust is used among the different domains inside a forest for implementing what?

authentication.

Because access to an object is at the discretion of the object's owner, the type of access control that's used in Windows is called?

discretionary access control.

Which of the following are responsibilities of the certificate authority (CA) that cannot be outsourced?

Key generation
Maintaining the CRL

Public keys of compromised
certificates can be

found in which ways?

CRL
OCSP

A security administrator uses third-party certificate authorities plus their own set of enterprise certificate authorities. How is a list of trusted certificate authorities delivered to a browser?

Group policy
Browser manufacturer

A network administrator
has a domain that

includes single location.

They want to store a copy of digital certificates with a trusted third party. What should be implemented?

Key escrow

When implementing biometric security, you want to allow the maximum number of legitimate users while blocking imposters. Which of the choices describes the aggregate rate of acceptance and rejection?

CER

On examining the methods of standard biometric authentication available, which would NOT be considered?

Speech recognition

You need to identify a federated development technology to be used to support SSO. Choose the technology that would NOT be used from those provided?

PBKDF2

While reviewing several certificate-based authentication methods, which choice can support event driven HOTP?

Cell phones

On inspecting the methods of standard biometric authentication identification available be which physical attribute would NOT be considered?

Weight

In the physical world, when a user's credentials are validated, they are considered to be what?

Authenticated

Access control models are created by what?

Hardware or software

By default, how often are group policies updated?

At computer start
At user login

Every 1 to 2 hours

All of these are correct

Which of these access models gives the user total control over an object?

DAC

Which of these access control models is the most restrictive?

MAC

The what tab on the folder's
Properties dialog box will show you the permissions assigned to each Access

Control Entry?

Security

The what tab on the folder's
Advanced Properties dialog box will show you the folder's owner?

Advanced

True or false? Owners of a file have full control of the object when using DAC
Access control method

true

Quiz
the geography of italy
Hamlet
verifica storia 26/03
il barone rampante dal capitolo 20 al 30
irish orals 26-31
irish orals 14-25
Comportamentos Éticos e Compliance
Salud
Besöksnäring-Turism
equazioni e disequazioni logaritmiche
Signes cliniques des aphasies, grands tableaux sémiologiques
irish orals 1-13
Déf et étiologies des aphasies
Neuroanatomie fonctionnelle du langage et voies de ttt du langage
hoofdstuk 3
Personen en begrippen HC 4 nieuwe tijd 1
Biologia 1
✩・:*German ⭒✩・:
직업 👮‍♀️👨‍🏫🧑‍🔬
cyber security 10
it management chapter 7
cyber security chapter 9
farmacocinética aplicadaa odonto
biologi prov genetik
Anthro week 10-11
Matemática Financeira
préposition des verbes
Koine Greek Ch. 25 Imperative Mood
English
Noções de Probabilidade e Estatística
vocabulary 1
Anglais
집 🏠🛋️🪑
교실 👩‍🏫📚📝
módulo 1 B
BABY BOOMERS
Fatores bioticos e abioticos
digestão
Biologi
Engels Unit 3 Vocabulairy 3.1 t/m 3.4 + Phrases - copy
Spaans: Zomervakantie
attack on the queen
vicab
ss
Hur Sverige styrs
Ethics
GSS35L
Osteoporose
gs
hl bio test pt. 2