A user accessing a computer system must present credentials or ____ when logging on to the system.
Respuesta
a. identification
b. token
c. access
d. authorize
Pregunta 2
Pregunta
A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Respuesta
a. reference monitor
b. subject
c. label
d. entity
Pregunta 3
Pregunta
A(n) ____ is a set of permissions that are attached to an object.
Respuesta
a. entity
b. ACE
c. DAC
d. ACL
Pregunta 4
Pregunta
During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____.
Respuesta
a. authentication request
b. access request
c. accounting request
d. verification request
Pregunta 5
Pregunta
The action that is taken by the subject over the object is called a(n) ____.
Respuesta
a. control
b. access
c. operation
d. authorization
Pregunta 6
Pregunta
____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Respuesta
a. Kerberos
b. FTP
c. RADIUS
d. TACACS
Pregunta 7
Pregunta
____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Respuesta
a. Aurora
b. CHAP
c. TACACS
d. Kerberos
Pregunta 8
Pregunta
____ is often used for managing user access to one or more systems.
Respuesta
a. Rule Based Access Control
b. Role Based Access Control
c. Mandatory Access Control
d. Discretionary Access Control
Pregunta 9
Pregunta
A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources.
Respuesta
True
False
Pregunta 10
Pregunta
TACACS+ and RADIUS are designed to support hundreds of remote connections.