Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
CompTIA Security Guide
Quiz 12: Access Management
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Which of the following controls can be implemented so an organization can configure multiple computers by setting a single policy for enforcement?
Question 22
Multiple Choice
Which of the following is a simpler subset of Directory Access Protocol?
Question 23
Multiple Choice
Although designed to support remote dial-in access to a corporate network,what service below is commonly used with 802.1x port security for both wired and wireless LANs?
Question 24
Multiple Choice
What standard provides a greater degree of security by implementing port-based authentication and blocks all traffic on a port-by-port basis until the client is authenticated using credentials stored on an authentication server?
Question 25
Multiple Choice
User accounts that remain active after an employee has left an organization are referred to as being what type of accounts?
Question 26
Multiple Choice
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) ,what is this process called?
Question 27
Multiple Choice
Select the authentication system developed by the Massachusetts Institute of Technology (MIT) to verify the identity of network users.
Question 28
Multiple Choice
What type of computer can forward RADIUS messages between RADIUS clients and RADIUS servers?
Question 29
Multiple Choice
The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following options?
Question 30
Multiple Choice
Which of the following is a database stored on the network itself that contains information about users and network devices?
Question 31
Multiple Choice
What is an entry in an ACL known as?
Question 32
Multiple Choice
Select the XML standard that allows secure web domains to exchange user authentication and authorization data and is used extensively for online e-commerce transactions.
Question 33
Multiple Choice
What framework is used for transporting authentication protocols instead of the authentication protocol itself?
Question 34
Multiple Choice
What policy is designed to ensure that all confidential or sensitive materials,either in paper form or electronic,are removed from a user's workspace and secured when the items not in use or when employees leave their workspace?