Skip to main content

IS5403 Week 6 all Quizezz

7
Question

Which of the following aims to support distributed authentication and authorization over the Internet?

Correct
 
7 of 13
8
Question

In Windows network, transitive trust is used among the different domains inside a forest for implementing:

Correct
 
8 of 13
9
Question

In which of the following types of access control is the default for Windows systems and has access determined by the owner of a resource?

Correct
 
9 of 13
10
Question

Which of the following are responsibilities of the certificate authority (CA) that cannot be outsourced? (Choose all that apply.)

Correct
 
10 of 13
11
Question

Public keys of compromised certificates can be found in which ways? (Choose all that apply.)

Correct
 
11 of 13
12
Question

A security administrator uses third-party certificate authorities plus their own set of enterprise certificate authorities. How is a list of trusted certificate authorities delivered to a browser? (Choose all that apply.)

Correct
 
12 of 13
13
Question

A network administrator has a domain that includes single location. They want to store a copy of digital certificates with a trusted third party. What should be implemented?

Correct 


2
Question

Which of the following are recompiled UNIX tools that can hide evidence of the intrusion?

Correct
 
2 of 5
3
Question

Which of the following are valid types of password attack? [Choose all that apply.]

Correct
 
3 of 5
4
Question

What is always the first line of defense in protecting data and information?

Correct
 
4 of 5
5
Question

Which of the following factors should be considered and addressed in regards to account policy enforcement? [Choose all that apply.]

Correct
What is a token system that requires the user to enter the code along with a PIN called?
CORRECT
Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the development of authorization protocols. Which of these technologies would he recommend?
CORRECT
Creating a pattern of where a user accesses a remote web account is an example of which of the following?
CORRECT
Which authentication factor is based on a unique talent that a user possesses?
CORRECT
Each of the following accounts should be prohibited EXCEPT:
CORRECT
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that is the slowest yet most thorough attack that is used against passwords. Which of these password attacks did he demonstrate?
CORRECT
Which of these is NOT a characteristic of a weak password?
CORRECT
Why should the account lockout threshold not be set too low?
CORRECT
How is key stretching effective in resisting password attacks?
CORRECT
Which of the following should NOT be stored in a secure password database?
CORRECT


____ biometrics is related to the perception, thought processes, and understanding of the user.
CORRECT
Which human characteristic is NOT used for biometric identification?
CORRECT
What is a hybrid attack?
CORRECT


What is a disadvantage of biometric readers?
CORRECT
Using one authentication credential to access multiple accounts or applications is known as _____.
CORRECT
Which of these is a U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel?
CORRECT
Which type of password attack is a more targeted brute force attack that uses placeholders for characters in certain positions of the password?
CORRECT

A TOTP token code is generally valid for what period of time?
CORRECT
Which one-time password is event-driven?
CORRECT
Which of these is NOT a reason why users create weak passwords?
CORRECT
Which of the following would NOT be considered as part of a clean desk policy?
CORRECT


What is the current version of TACACS?
CORRECT
Which access control model is the most restrictive?
CORRECT
Which Microsoft Windows feature provides group-based access control for centralized management and configuration of computers and remote users who are using Active Directory?
CORRECT

Which of the following is the Microsoft version of CHAP?
CORRECT
Which of the following is NOT true regarding how an enterprise should handle an orphaned or a dormant account?
CORRECT
Which type of access control model uses predefined rules that makes it flexible?
CORRECT
A RADIUS authentication server requires the ________ to be authenticated first.
CORRECT
Which can be used to establish geographical boundaries where a mobile device can and cannot be used?
CORRECT
Which of the following involves rights given to access specific resources?
CORRECT
How is the Security Assertion Markup Language (SAML) used?
CORRECT
Which statement about Rule-Based Access Control is true?
CORRECT
Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking?
CORRECT
With the development of IEEE 802.1x port security, what type of authentication server has seen even greater usage?
CORRECT
What is the least restrictive access control model?
CORRECT
What is the secure version of LDAP?
CORRECT
What is the version of the X.500 standard that runs on a personal computer over TCP/IP?
CORRECT
What can be used to provide both file system security and database security?
CORRECT
Which of the following is NOT part of the AAA framework?
CORRECT
Which of these is a set of permissions that is attached to an object?
CORRECT































































































































































































































































































































































































































Comments

Popular posts from this blog

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What...

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...