Security B

Your page rank:

Total word count: 1863
Pages: 7

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Cell Phones with cameras and data transfer capabilities pose a risk to which security goal?

Confidentiality

Which of the following is the correct definition of a threat.

Any potential danger to the confidentiality, integrity, or availability of information or systems

Which of the following is an example of internal threats.

A user accidently deletes the new product design

What is the greatest threat to the confidentiality of data in most secure organizations?

USB devices

Which of the following is an example of a vulnerability?

Misconfigured Server

"A user copies files from her desktop computer to a USB flash device and puts the device
into her pocket. Which of the following security goals is most at risk?"

Confidentiality

Which of the following is not a valid concept to associate with integrity.

Control access to resource to print unwanted access

"You have a system that allows the owner of a file to identify users and their permissions
to the files. Which type of access control model is implemented?"

"Discretionary Access Control (DAC) model. With DAC, individual use their own discretion ( decision or preferences) for assigning permissions and allowing or denying access."

What does the MAC method use to control access?

Sensitivity labels

Which of the following defines an objects as used in access control.

Data, Applications, systems, networks, and physical space

"What type of access control focuses on assigning privileges based on security clearance
and data sensitivity?"

"MAC (Mandatory Access Control) uses classifications to assign privileges based on a security clearances and data sensitivity."

"Which form of access control enforces security based on user identities and allows
individual users to define access control over owned resources?"

"DAC(Discretionary Access Control) uses identities to control resource access. Users can make their own decisions about the access to grant to others users."

You have implemented an access control method that allows only users who are managers to access specific data. Which type of access control model is used?

"Role-based access control (RBAC) allows access based on a role in an organization, not individual users. Roles are defined based on job description or a security access level. Users are made members of a role, and receive the permissions assigned to the role. "

A router access control list uses information in a packet such as the destination IP address and port number to make allow or deny forwarding decisions.

"Rule based access control (RBAC) uses characteristics of objects or subjects, along with rules, to restrict access,. Access control entries identify a set of characteristics that will be examined for a match. If all characteristics match, access is either allowed or denied based on the rule. An example of a rule-based access control implantation is a router access control list that allows or denies traffic based on characteristics within the packet (such as IP address or port number)."

Which of the following principles is impleneted in a mandatory access control model to detrmine access to an object using classification level?

Need to know

In what form of access control environment is access controlled by rules rather than by identity?

A MAC environment controls access based on rules rather then by identify.

Which access control model manages rights and permissions based on job descriptions and responsibilities?

"Role based access control (RBAC) is the access control model that managers rights and permissions based on job description. RBAC focuses on job description or work task, instead of employing user accounts to define access RBAC are best suited for environments that have a high rate of employees turnover. By defining access base on role that those individuals, it simplifies administration when granting a new person access to common activities. "

Which of the following advantages can Single Sign-On (SSO) prove?

"The elimination of multiple user accounts and passwords for an individual and access to all authorized resources with a single instance of authentication."

Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter?

False negative (Type I error) occurs when a person who should be allowed access is denied access.

Which of the following is the strongest form of mulch-factor authentication.

A Password, a biometric scan, and a token device

Which of the following are disadvantages of biometric.

"When used alone or solely, they are no more secure than a strong password, They have potential for numerous false negatives."

Which of the following is a hardware device that contains identification and which can be used to control building access or computer log on.

Smart Card

Which of the following is an example to two -factor authentication?

A token device and a PIN (type II something you have, such as a smart card, token device, or photo ID

Which of the following identification and authentication factors are often well-known or easy to discovery by others on the same network or system?

Username

What is mutual authentication?

A process by which each party in an online communication verifies the identity of the other party.

You maintain a network with four servers. Currently, users must provide authentication credential whenever they access a different server. Which solution allows users to supply authentication credentials once for all severs.

"Singe Sing-on(SSO) is a distributed access method that allows a subject to log in (sing on) once a network and access all authorized resources on the network. The SSO system authenticates the subject against a master system and automatically logs the subject on to all servers the subject is authorized to access. Once authenticated, the subject can request access to additional resources without additional loging credentials or passwords."

What is the most important aspect of a biometric device?

Accuracy

Which of the following are examples of Type II authentication credentials?

"Smart Card and Photo ID (Type II authentication uses something you have in your possession, such as a smart card, photo ID, token device, or swipe card."

Which of the following best describes one-factor authentication?

"Multiple authentication credentials may be required, but they are all of the same type. (something you know, such as a password, PIN, pass phrase, or cognitive question)"

Which of the following is the most common form of authentication?

Password

Which of the following is an example of three-factor authentication?

"Token device, keystroke analysis, cognitive question (type III something you are, such as fingerprints, retina scans, voice recognition, or keybo9ard dynamics)"

Which of the following are example of Type II authentication credentials

Photo ID and smart card.

Which of the following is not a form of biometric?

Token device

What should be done to a user account if the user goes on an extended vacation?

Disable the account

Which of the following is an example of a strong password?

a8bT11$yi (a strong password should not contain dictionary words or any part of the login name. They should include upper-and lower-case letters, and symbols. In addtioin, longer passwords are stronger than shorter passwords.

"You ware configuring the local security policy of a Windows 7 sytem. You want prevent
users from reusing old passwords. You also want to force them to use a new password
for at least 5 days before changing it again."

Minimum password age and Enforce password history

"You are configuring the local secuirty policy of a Windows 7 system. You want to require
users to create passwords that are at least 10 characters long. You also want to prevent
logon after three unsuccessful logon attempts. "

Minimum password length and account lockout threshold

Which of the following is the single best rule to enforce when designing complex passwords.

Longer passwords

"You have hired 10 new temporary workers who will be with the company for 3 months.
You want to make sure that these users can only log on during regular business hours. What should you do?"

Configure day/time restrictions in the user accounts

"You want to make sure that all users have password over 8 characters and that
passwords must be changed every 30 days. What should you do?"

Configure account policies in Group Policy

"For users on your network, you want to automatically lock their user accounts if four
incorrect passwords are used within 10 minutes. What should you do?"

Configure account lockout policies in Group Policy

"You have hired 10 new temporary workers who will be with the company for 3 months.
You want to make sure that after that time the user accounts cannot be used for log on. What should you do?"

Configure account expiration in the user accounts

"What security mechanism uses a unique list for each object embedded directly in the
object itself that defines which subjects to have access to certain objects and the
level or type of access allowed?"

User ACL

"You want to give all managers the ability to view and edit a certain file.
To do so, you need to edit the discretionary access control list (DACL) associated with the file. You want to be able to easily add and remove managers as their job positions change.
What is the best way to accomplish this?"

Create a security group for the managers. Add all users as members of the group. Add the group to the file’s DACL

Which of the following information is typically not included in an access token?

User Account password

"For users who are members of the Sales team, you want to force thier computers to use
a specific desktop background and remove access to administrative tools from the Start menu."

Group Policy

"You have multiple users who are computer administrators.
You want each administrator to be able to shut down systems and install drivers."

Grant the group the necessary user rights. Create a security group for the administrators: add all user accounts to the group.

"Which of the following terms describes the component that is generated following
authentication and which is used to gain access to resources following log on?"

Access token

"You have two folders that contain documents used by various departments:
The Development group has been given the Write permission to the Design folder.
The Sales group has been given the write permission to the Products folder.
User Mark Tilman needs to have the Read permission to the Design folder and the
Write permission to the Products folder. You want to use groups as much as possible.
What should you do?"

Make mark a member of the Sales group; add Mark’s user account directly to the ACL for the Design folder.

"Marcus White has just been promoted to a manager. To give him access to the files that he
needs, you make his user account a member of the Managers group which has access to a
special shared folder. Later that afternoon, Marcus tells you that he is still unable to
access the files reserved for the Managers group. What should you do?"

Have Marcus log off and log back on

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending