Preview

Quiz 1

Satisfactory Essays
Open Document
Open Document
308 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Quiz 1
Quiz 1
1. Which among the following is the process of process of proving that provided identity credentials are valid and correct?
Identification
Authorization
Nonrepudation
Authentication
2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?
Active Directory pre-defines common groups
Groups define collections of local users
You can only define ACLs by groups
Groups streamline defining ACLs
3. Which of the following statements best describes the principle of least privilege?
Reducing a user or group’s privilege to a point they do not overlap with any other user or group
Ensuring no single person can complete a business critical task
Denying access to objects with a lower classification than the subject’s clearance
Providing just the access necessary to complete a task and nothing more
4. In which process would a user be asked to enter a token- generated password?
Authorization
Nonrepudiation
Authentication
Validation
5. Which Windows command-line utility allows administrators to change access controls setting?
Appcmd
Attrib
Icacls
wbadmin
6. Which of the following is the best reason to use Active Directory?
All domain users infert Microsoft-Active Directory secure profile
Active Directory is included in all Microsoft operating systems
A user has a single SID across all computers in a domain
A user has a unique SID for each computer in a domain
7. Which structure does Windows use to share access control rules for objects?
Active Directory
Security Identifier
Security Access Token
Access Control List
8. Which Microsoft feature enables administrators to define access controls in a centralized location?
Security Identifier
Active Directory
Security Access Token
Access Control List

9. The ability to run a backup is an example of which Windows feature?
ACL
Right
Permission
Capability
10. Which core part of an operating system provides essential services?
Kernel
Service
Driver
Module

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The process of confirming a user's identity, usually by requiring the user to supply some sort of token, such as a password or a certificate, is called authentication : Authentication…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Quiz 1

    • 683 Words
    • 3 Pages

    Fred and Ginger are general partners in a business. They decide to purchase a building for the partnership. Ginger will put up the money for the building, and Fred will complete the remodeling. While inspecting the building, Fred is informed that the building is packed full of asbestos. He fails to tell Ginger of the presence of the substance. They buy the building and go into business. During the remodeling of the building, people from the neighborhood begin complaining about the dust from the building. Some of them even threaten to sue. Who is liable?…

    • 683 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. The password assigned must be adequately complex to insure that it is not easily guessed and the complexity of the chosen alternative must be defined and documented.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Quiz 5

    • 507 Words
    • 9 Pages

    By default, __________ downloads and erases the email from the mailbox on the email server,…

    • 507 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 225 Words
    • 2 Pages

    TCO 2) A statement that reports inflows and outflows of cash during the accounting period in the categories of operations, investing, and financing, is called a(an):…

    • 225 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz 1

    • 2306 Words
    • 10 Pages

    Feedback: See "The system concept" in Chapter 1. All of the above examples are described as systems.…

    • 2306 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    1. A null session is basically a pseudoaccount that has no username or password, but can used to access information on ___.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.…

    • 263 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The DN (distinguished name) of an active directory object identifies its location within the directory structure.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Quiz 1

    • 497 Words
    • 2 Pages

    9. We tend to absorb the beliefs of those around us as we mature from children into adults.…

    • 497 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Master

    • 4328 Words
    • 18 Pages

    The Edge Transport server role cannot coexist on the same computer with any other server role. Recommendation: Install the Edge Transport server role on a computer that is not part of a domain.…

    • 4328 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Active Directory Notes

    • 595 Words
    • 3 Pages

    * X.500- Uses a hierarchical, creates the Directory Information Tree (DIT), Each object has a unique “Distinguished Name”…

    • 595 Words
    • 3 Pages
    Good Essays