Ovido
Language
  • English
  • Spanish
  • French
  • Portuguese
  • German
  • Italian
  • Dutch
  • Swedish
Text
  • Uppercase

User

  • Log in
  • Create account
  • Upgrade to Premium
Ovido
  • Home
  • Log in
  • Create account

cyber security 12

Which of the following would NOT be considered
as part of a clean desk policy?

Do not share passwords with other employees.

Which of the following is
NOT true regarding how an enterprise should handle an orphaned or a dormant account?

All orphaned and dormant accounts should be deleted immediately whenever they are discovered.

Which of the following is
NOT part of the AAA framework?

Access

What can be used to provide both file system security and database security?

ACL

With the development of
IEEE 802.1x port security, what type of authentication server has seen even greater usage?

RADIUS

Which Microsoft Windows feature provides group-based access control for centralized management and configuration of computers and remote users who are using Active Directory?

Group policy

Which access control model is the most restrictive?

МАС

Which of the following involves rights given to access specific resources?

Access

What is the version of the
X.500 standard that runs on a personal computer over

TCP/IP?

LDAP

Which type of access control model uses predefined rules that makes it flexible?

ABAC

A RADIUS authentication server requires the what ? to be authenticated first.

supplicant

What is the secure version of
LDAP?

LDAPS

Which can be used to establish geographical boundaries where a mobile device can and cannot be used?

Location-based policies

Which can be used to establish geographical boundaries where a mobile device can and cannot be used?

Location-based policies

How is the Security Assertion
Markup Language (SAML)

used?

It allows secure web domains to exchange user authentication and authorization data.

Which of the following is the Microsoft version of CHAP?

MS-CHAP

What is the current version of TACACS?

TACACS+

Which statement about Rule-Based Access Control is true?

It dynamically assigns roles to subjects based on rules.

Which of these is a set of permissions that is attached to an object?

Access control list (ACL)

What is the least restrictive access control model?

DAC (correct)

Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking?

Custodian

Quiz
cyber security 11
it management 8-9
232 Hydration
WW1
Transition metal ion colours
lessico inglese
Näringslära
260
Engels Vocabulairy 1.1 t/m 1.4 - copy
FAR Leases
Filipino
economie
segnali
Cardiology Drugs
Osteologia
Biology Unit
cardiovascular syatem
health
physical educ.
Engels Vocabulairy 1.1 t/m 1.4
biologia
American Gov Vocab
arts
music
english
10 theories
Romantismo Brasileiro
Arcadismo
Economia, política e religião da grécia antiga
Economia persa, evolução política persa e religião persa
Hebreus
Fenícios
Egito antigo
Mesopotamia
Período Neolítico
Período Paleolítico
anglais aeroportuaire
International Appetizers
Appetizers
Definition of Terms
Chaussant du pied diabetique
Bio 112L Urinary System
Latinska namn
Income from other sources
capital gain
week 10-acne trts
b
Vocabulaire de la semaine 12
angl
Modalities Final Theory Exam Review