nsf_09(11)

Descrição

access control fundamentals
865 538
Quiz por 865 538, atualizado more than 1 year ago
865 538
Criado por 865 538 mais de 7 anos atrás
50
0

Resumo de Recurso

Questão 1

Questão
A user accessing a computer system must present credentials or ____ when logging on to the system.
Responda
  • a. identification
  • b. token
  • c. access
  • d. authorize

Questão 2

Questão
A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Responda
  • a. reference monitor
  • b. subject
  • c. label
  • d. entity

Questão 3

Questão
A(n) ____ is a set of permissions that are attached to an object.
Responda
  • a. entity
  • b. ACE
  • c. DAC
  • d. ACL

Questão 4

Questão
During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____.
Responda
  • a. authentication request
  • b. access request
  • c. accounting request
  • d. verification request

Questão 5

Questão
The action that is taken by the subject over the object is called a(n) ____.
Responda
  • a. control
  • b. access
  • c. operation
  • d. authorization

Questão 6

Questão
____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Responda
  • a. Kerberos
  • b. FTP
  • c. RADIUS
  • d. TACACS

Questão 7

Questão
____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Responda
  • a. Aurora
  • b. CHAP
  • c. TACACS
  • d. Kerberos

Questão 8

Questão
____ is often used for managing user access to one or more systems.
Responda
  • a. Rule Based Access Control
  • b. Role Based Access Control
  • c. Mandatory Access Control
  • d. Discretionary Access Control

Questão 9

Questão
A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources.
Responda
  • True
  • False

Questão 10

Questão
TACACS+ and RADIUS are designed to support hundreds of remote connections.
Responda
  • True
  • False

Semelhante

nsf_03
865 538
nz ns gm
Gene Miranda
nsf_02
865 538
nsf_04(15)
865 538
nsf_05(4)
865 538
nsf_06(7)
865 538
nsf_01
865 538
nsf_07(8)
865 538
nsf_08(9)
865 538
Dioses
Andres Tejada
As 22 consagradas leis do Marketing
Cristiano Bertul