Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 ( 1 point ) Wen is a network engineer. For several months, he has been designing a system of controls to allow and

Question 1(1 point)
Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?
Question 1 options:
Answers the question "who is asking to access the asset?"
Verifies that requestors are who they claim to be
Grants or denies a requestor access and what they can do on a network
Determines how actions can be traced to an individual
Question 2(1 point)
Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?
Question 2 options:
Remote Authentication Dial-In User Service (RADIUS)
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Question 3(1 point)
What is an example of a logical access control?
Question 3 options:
Key for a lock
Password
Access card
Fence
Question 4(1 point)
Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?
Question 4 options:
Enables a 30-day password change policy
Requires all passwords to contain at least eight alphanumeric characters
Mandates that no password includes words common in an English dictionary
Forbids a password being changed to any of the previous 10 passwords listed in the password history
Question 5(1 point)
Devaki is evaluating different biometric systems. She understands that users might not want to subject themselves to retinal scans due to privacy concerns. Which concern of a biometric system is she considering?
Question 5 options:
Accuracy
Reaction time
Dynamism
Acceptability
Question 6(1 point)
Anya is a cybersecurity engineer for a high-secrecy government installation. She is configuring biometric security that will either admit or deny entry using facial recognition software. Biometric devices have error rates and certain types of accuracy errors that are more easily tolerated depending on need. In this circumstance, which error rate is she likely to allow to be relatively high?
Question 6 options:
None
Crossover error rate (CER)
False acceptance rate (FAR)
False rejection rate (FRR)
Question 7(1 point)
What is a single sign-on (SSO) approach that relies upon the use of key distribution centers (KDCs) and ticket-granting servers (TGSs)?
Question 7 options:
Secure European System for Applications in a Multi-vendor Environment (SESAME)
Lightweight Directory Access Protocol (LDAP)
Security Assertion Markup Language (SAML)
Kerberos
Question 8(1 point)
An automatic teller machine (ATM) uses a form of constrained user interface to limit the user's ability to access resources in the system. Specifically for ATMs, which method is being used?
Question 8 options:
Database views
Encryption
Menus
Physically constrained user interfaces
Question 9(1 point)
Maria is using accounting software to compile sensitive financial information. She receives a phone call and then momentarily leaves her desk. While she's gone, Bill walks past her cubicle and sees that she has not locked her desktop and left data exposed. Bill uses his smartphone to take several photos of this data with the intent of selling it to the company's competitor. What access control compromise is taking place?
Question 9 options:
Accessing networks
Eavesdropping by observation
Exploiting hardware and software
Gaining physical access
Question 10(1 point)
A company's IT manager has advised the business's executives to use a method of decentralized access control rather than centralized to avoid creating a single point of failure. She selects a common protocol that hashes passwords with a one-time challenge number to defeat eavesdropping-based replay attacks. What is this protocol?
Question 10 options:
Challenge-Handshake Authentication Protocol (CHAP)
Lightweight Directory Access Protocol (LDAP)
Kerberos
Password Authentication Protocol (PAP)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

SQL Server Query Performance Tuning

Authors: Sajal Dam, Grant Fritchey

4th Edition

1430267429, 9781430267423

More Books

Students also viewed these Databases questions

Question

Summarize the forms and functions of nonverbal communication.

Answered: 1 week ago

Question

What is meant by planning or define planning?

Answered: 1 week ago

Question

Define span of management or define span of control ?

Answered: 1 week ago

Question

What is meant by formal organisation ?

Answered: 1 week ago

Question

What is meant by staff authority ?

Answered: 1 week ago