nsf_09(11)

Beschreibung

access control fundamentals
865 538
Quiz von 865 538, aktualisiert more than 1 year ago
865 538
Erstellt von 865 538 vor mehr als 7 Jahre
53
0

Zusammenfassung der Ressource

Frage 1

Frage
A user accessing a computer system must present credentials or ____ when logging on to the system.
Antworten
  • a. identification
  • b. token
  • c. access
  • d. authorize

Frage 2

Frage
A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Antworten
  • a. reference monitor
  • b. subject
  • c. label
  • d. entity

Frage 3

Frage
A(n) ____ is a set of permissions that are attached to an object.
Antworten
  • a. entity
  • b. ACE
  • c. DAC
  • d. ACL

Frage 4

Frage
During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____.
Antworten
  • a. authentication request
  • b. access request
  • c. accounting request
  • d. verification request

Frage 5

Frage
The action that is taken by the subject over the object is called a(n) ____.
Antworten
  • a. control
  • b. access
  • c. operation
  • d. authorization

Frage 6

Frage
____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Antworten
  • a. Kerberos
  • b. FTP
  • c. RADIUS
  • d. TACACS

Frage 7

Frage
____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Antworten
  • a. Aurora
  • b. CHAP
  • c. TACACS
  • d. Kerberos

Frage 8

Frage
____ is often used for managing user access to one or more systems.
Antworten
  • a. Rule Based Access Control
  • b. Role Based Access Control
  • c. Mandatory Access Control
  • d. Discretionary Access Control

Frage 9

Frage
A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources.
Antworten
  • True
  • False

Frage 10

Frage
TACACS+ and RADIUS are designed to support hundreds of remote connections.
Antworten
  • True
  • False
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

nsf_03
865 538
nz ns gm
Gene Miranda
nsf_02
865 538
nsf_04(15)
865 538
nsf_05(4)
865 538
nsf_06(7)
865 538
nsf_01
865 538
nsf_07(8)
865 538
nsf_08(9)
865 538
Dioses
Andres Tejada
Imperialismus Zusammenfassung
Laura Overhoff