Zusammenfassung der Ressource
Frage 1
Frage
A user accessing a computer system must present credentials or ____ when logging on to the system.
Antworten
-
a. identification
-
b. token
-
c. access
-
d. authorize
Frage 2
Frage
A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Antworten
-
a. reference monitor
-
b. subject
-
c. label
-
d. entity
Frage 3
Frage
A(n) ____ is a set of permissions that are attached to an object.
Antworten
-
a. entity
-
b. ACE
-
c. DAC
-
d. ACL
Frage 4
Frage
During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____.
Frage 5
Frage
The action that is taken by the subject over the object is called a(n) ____.
Antworten
-
a. control
-
b. access
-
c. operation
-
d. authorization
Frage 6
Frage
____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Antworten
-
a. Kerberos
-
b. FTP
-
c. RADIUS
-
d. TACACS
Frage 7
Frage
____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Antworten
-
a. Aurora
-
b. CHAP
-
c. TACACS
-
d. Kerberos
Frage 8
Frage
____ is often used for managing user access to one or more systems.
Antworten
-
a. Rule Based Access Control
-
b. Role Based Access Control
-
c. Mandatory Access Control
-
d. Discretionary Access Control
Frage 9
Frage
A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources.
Frage 10
Frage
TACACS+ and RADIUS are designed to support hundreds of remote connections.