Deck 22: Privilege Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
Play
Full screen (f)
Deck 22: Privilege Management
1
A file or resource owner has the ability to change the permissions on that file or resource.
A)MAC
B)DAC
C)RBAC
D)RBOC
A)MAC
B)DAC
C)RBAC
D)RBOC
B
2
Groups are used to
A)Create a collection of users to simplify privilege management
B)Circumvent an overly restrictive ACL ruleset
C)Create a collection of programs simplifying ACL implementation
D)Separate computers into logical groups that perform similar functions
A)Create a collection of users to simplify privilege management
B)Circumvent an overly restrictive ACL ruleset
C)Create a collection of programs simplifying ACL implementation
D)Separate computers into logical groups that perform similar functions
A
3
Which of the following is the strongest password?
A)swordfish
B)Supercalifragilisticexpialidocious
C)1Aw3u$iaIiWtww1s1a!
D)P@ $$w0rd
A)swordfish
B)Supercalifragilisticexpialidocious
C)1Aw3u$iaIiWtww1s1a!
D)P@ $$w0rd
C
4
What is the use of "securityadmin" in Microsoft SQL Server an example of?
A)DAC
B)MAC
C)Role-based access control
D)Rule-based access control
A)DAC
B)MAC
C)Role-based access control
D)Rule-based access control
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
Management password policy should address all of the following except?
A)Password reuse
B)Password complexity rules
C)Protection of passwords
D)Password salting to ensure unique hash values
A)Password reuse
B)Password complexity rules
C)Protection of passwords
D)Password salting to ensure unique hash values
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
A network administrator wants to specify the number of days a password must be used before it can be changed again.What domain password policy will need to be configured?
A)Enforce password history
B)Maximum password age
C)Minimum password age
D)Minimum password length
A)Enforce password history
B)Maximum password age
C)Minimum password age
D)Minimum password length
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
What environment does UNIX use?
A)DAC
B)MAC
C)Role-based access control
D)Rule-based access control
A)DAC
B)MAC
C)Role-based access control
D)Rule-based access control
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
Administrator,root,and superuser are accounts that have the power to do anything that can be done on a system.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is the most effective password policy to enforce for system security?
A)Setting password lengths to be 14 characters or more
B)Setting the password history to be 20 or higher
C)Setting a password expiration of 60 days
D)Setting a minimum password age of 180 days or more
A)Setting password lengths to be 14 characters or more
B)Setting the password history to be 20 or higher
C)Setting a password expiration of 60 days
D)Setting a minimum password age of 180 days or more
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
The access control model that most closely resembles an organization's structure.
A)MAC
B)DAC
C)RBAC
D)RBOC
A)MAC
B)DAC
C)RBAC
D)RBOC
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
What is the process used to ensure that users have the correct rights to perform their jobs?
A)Usage auditing
B)Audit trails
C)Privilege management
D)Escalation auditing
A)Usage auditing
B)Audit trails
C)Privilege management
D)Escalation auditing
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
What is the name of the process that controls access to information based on the sensitivity of that information and whether or not the user is operating at the appropriate sensitivity level and has the authority to access that information?
A)MAC
B)DAC
C)RBAC
D)RBOC
A)MAC
B)DAC
C)RBAC
D)RBOC
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
Minimum password age policy specifies the number of days a password may be used before it must be changed.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
Your boss expressed concern about employees working on the network on weekends.She asks if there is something you can do to ensure that they do not have access.What would be the best way to accomplish this?
A)Publish a memo stating that employees will not be allowed to access the network on weekends.
B)Set time-of-day restrictions on employee accounts for the weekend.
C)Keep the building locked.
D)Set up closed-circuit TV cameras on employee workstations.
A)Publish a memo stating that employees will not be allowed to access the network on weekends.
B)Set time-of-day restrictions on employee accounts for the weekend.
C)Keep the building locked.
D)Set up closed-circuit TV cameras on employee workstations.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is NOT an advantage of decentralized privilege management?
A)It is highly flexible;changes can be made whenever they are needed.
B)It does not require a dedicated set of personnel and resources.
C)It reduces bureaucracy.
D)Fewer people must be trained on tasks associated with privilege management.
A)It is highly flexible;changes can be made whenever they are needed.
B)It does not require a dedicated set of personnel and resources.
C)It reduces bureaucracy.
D)Fewer people must be trained on tasks associated with privilege management.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is usually synonymous with a job or set of functions?
A)Superuser
B)Role
C)Privilege
D)Sign on
A)Superuser
B)Role
C)Privilege
D)Sign on
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
Groups are assigned by location,not function.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
The lowest level of classified information,which is defined as information that would "damage" national security,is known as "unclassified."
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
A network administrator wants to be sure that when users change their passwords they do not reuse a previous password.What domain password policy will need to be configured?
A)Enforce password history
B)Maximum password age
C)Minimum password age
D)Minimum password length
A)Enforce password history
B)Maximum password age
C)Minimum password age
D)Minimum password length
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
Permissions are applied to users,not to groups.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
A user who can do anything on a system is known as a(n)________.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
Assigning permissions to a collection of users based on some common criteria is called ____________.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
User account passwords can be set up to automatically expire.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
Mandatory access control is the process of controlling access to information based on the sensitivity of that information,as well as whether or not the user is operating at the appropriate sensitivity level and has the authority to access that information.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
_______________ control what the user is allowed to do with the objects on the system.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
_______________ tells the system how many passwords to remember and does not allow a user to reuse an old password.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
Role-based access control is a method of managing access and privileges based on a set of predefined rules.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
A(n)_______________ is the unique alphanumeric identifier used by a user when logging into or accessing a system.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
What are the different methods of access management (MAC,DAC,RBAC)?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
What are the differences between user,group,and role management?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
_______________ is the process of restricting a user's ability to interact with the computer system.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
The process of restricting a user's ability to interact with the computer system is called __________.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
Rights tend to be actions that deal with accessing the system itself,process control,and logging.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
What are password and domain password policies?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
_______________ encryption is a form of encryption that can be easily decrypted and is essentially the same as storing a plaintext version of the password.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
_______________ specifies the number of days a password may be used before it must be changed.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
Under privilege management,a(n)_______________ is a collection of users with some common criteria,such as a need for access to a particular dataset
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
Windows operating systems use the concept of permissions AND rights to control access to files,folders,and information resources.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
Describe methods of account management (SSO,time of day,logical token,account expiration).
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck