Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Question 1 ( 1 point ) Wen is a network engineer. For several months, he has been designing a system of controls to allow and
Question point Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do Question options: Answers the question "who is asking to access the asset?" Verifies that requestors are who they claim to be Grants or denies a requestor access and what they can do on a network Determines how actions can be traced to an individual Question point Keisha is a network administrator. She wants a cloudbased service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for? Question options: Remote Authentication DialIn User Service RADIUS Infrastructure as a Service IaaS Platform as a Service PaaS Software as a Service SaaS Question point What is an example of a logical access control? Question options: Key for a lock Password Access card Fence Question point Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do Question options: Enables a day password change policy Requires all passwords to contain at least eight alphanumeric characters Mandates that no password includes words common in an English dictionary Forbids a password being changed to any of the previous passwords listed in the password history Question point Devaki is evaluating different biometric systems. She understands that users might not want to subject themselves to retinal scans due to privacy concerns. Which concern of a biometric system is she considering? Question options: Accuracy Reaction time Dynamism Acceptability Question point Anya is a cybersecurity engineer for a highsecrecy government installation. She is configuring biometric security that will either admit or deny entry using facial recognition software. Biometric devices have error rates and certain types of accuracy errors that are more easily tolerated depending on need. In this circumstance, which error rate is she likely to allow to be relatively high? Question options: None Crossover error rate CER False acceptance rate FAR False rejection rate FRR Question point What is a single signon SSO approach that relies upon the use of key distribution centers KDCs and ticketgranting servers TGSs Question options: Secure European System for Applications in a Multivendor Environment SESAME Lightweight Directory Access Protocol LDAP Security Assertion Markup Language SAML Kerberos Question point An automatic teller machine ATM uses a form of constrained user interface to limit the user's ability to access resources in the system. Specifically for ATMs, which method is being used? Question options: Database views Encryption Menus Physically constrained user interfaces Question point Maria is using accounting software to compile sensitive financial information. She receives a phone call and then momentarily leaves her desk. While she's gone, Bill walks past her cubicle and sees that she has not locked her desktop and left data exposed. Bill uses his smartphone to take several photos of this data with the intent of selling it to the company's competitor. What access control compromise is taking place? Question options: Accessing networks Eavesdropping by observation Exploiting hardware and software Gaining physical access Question point A company's IT manager has advised the business's executives to use a method of decentralized access control rather than centralized to avoid creating a single point of failure. She selects a common protocol that hashes passwords with a onetime challenge number to defeat eavesdroppingbased replay attacks. What is this protocol? Question options: ChallengeHandshake Authentication Protocol CHAP Lightweight Directory Access Protocol LDAP Kerberos Password Authentication Protocol PAP
Question point
Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do
Question options:
Answers the question "who is asking to access the asset?"
Verifies that requestors are who they claim to be
Grants or denies a requestor access and what they can do on a network
Determines how actions can be traced to an individual
Question point
Keisha is a network administrator. She wants a cloudbased service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?
Question options:
Remote Authentication DialIn User Service RADIUS
Infrastructure as a Service IaaS
Platform as a Service PaaS
Software as a Service SaaS
Question point
What is an example of a logical access control?
Question options:
Key for a lock
Password
Access card
Fence
Question point
Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do
Question options:
Enables a day password change policy
Requires all passwords to contain at least eight alphanumeric characters
Mandates that no password includes words common in an English dictionary
Forbids a password being changed to any of the previous passwords listed in the password history
Question point
Devaki is evaluating different biometric systems. She understands that users might not want to subject themselves to retinal scans due to privacy concerns. Which concern of a biometric system is she considering?
Question options:
Accuracy
Reaction time
Dynamism
Acceptability
Question point
Anya is a cybersecurity engineer for a highsecrecy government installation. She is configuring biometric security that will either admit or deny entry using facial recognition software. Biometric devices have error rates and certain types of accuracy errors that are more easily tolerated depending on need. In this circumstance, which error rate is she likely to allow to be relatively high?
Question options:
None
Crossover error rate CER
False acceptance rate FAR
False rejection rate FRR
Question point
What is a single signon SSO approach that relies upon the use of key distribution centers KDCs and ticketgranting servers TGSs
Question options:
Secure European System for Applications in a Multivendor Environment SESAME
Lightweight Directory Access Protocol LDAP
Security Assertion Markup Language SAML
Kerberos
Question point
An automatic teller machine ATM uses a form of constrained user interface to limit the user's ability to access resources in the system. Specifically for ATMs, which method is being used?
Question options:
Database views
Encryption
Menus
Physically constrained user interfaces
Question point
Maria is using accounting software to compile sensitive financial information. She receives a phone call and then momentarily leaves her desk. While she's gone, Bill walks past her cubicle and sees that she has not locked her desktop and left data exposed. Bill uses his smartphone to take several photos of this data with the intent of selling it to the company's competitor. What access control compromise is taking place?
Question options:
Accessing networks
Eavesdropping by observation
Exploiting hardware and software
Gaining physical access
Question point
A company's IT manager has advised the business's executives to use a method of decentralized access control rather than centralized to avoid creating a single point of failure. She selects a common protocol that hashes passwords with a onetime challenge number to defeat eavesdroppingbased replay attacks. What is this protocol?
Question options:
ChallengeHandshake Authentication Protocol CHAP
Lightweight Directory Access Protocol LDAP
Kerberos
Password Authentication Protocol PAP
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started