E10 - Database Security (WBT) Flashcards Preview

Luminary Tenets > E10 - Database Security (WBT) > Flashcards

Flashcards in E10 - Database Security (WBT) Deck (156):
1

True or false: Eloqua allows you to manage security settings at the database level for the whole organization.

true

2

When are security settings configured?

At the time of Eloqua installation.

3

How do you access security settings?

Settings: Setup: Administration: Security

4

What should you do before modifying security settings?

Consult Eloqua

5

What are your options for password requirements?

Use a pre-built password policy or create a new one.

6

What is the default security complexity setting?

Eloqua Security Complexity

7

Can you change Password complexity settings if you are using the Eloqua Security Complexity setting?

No.

8

When using Eloqua Security Complexity setting, the password values are _____ and hidden from view.

hard-coded

9

When using Eloqua Security Complexity setting, the password values are hard-coded and ____.

hidden from view

10

What is the difference between Eloqua Security Complexity and Windows Security Complexity?

Windows Security Complexity is stricter.

11

If changes are required to Eloqua Security Complexity or Windows Security Complexity, what must you use?

Custom Security Complexity

12

When are the settings active under the Password complexity settings section?

Only if you have chosen Custom security complexity.

13

What determines the password expiration timeframe?

User passwords expire in

14

What are the maximum and minimum values for password expiration?

365 days and 0 days

15

What is the value for password expiration in Eloqua security complexity?

120 days

16

What is the value for password expiration in Windows security complexity?

42 days

17

What is the value for password expiration in Custom security complexity?

120 days

18

If you set the value for password expiration to zero, what does this mean?

The password will never expire.

19

What setting determines how long a user must wait before reusing a previous password?

Number of days in which a password cannot be reused.

20

The value in the "Number of days in which a password cannot be reused" is also driven by the setting in the ___ field.

Enforce password history

21

What is the value for Number of days in which a password cannot be reused in the Eloqua security complexity?

0 days

22

What is the value for Number of days in which a password cannot be reused in the Windows security complexity?

2 days

23

What is the value for Number of days in which a password cannot be reused in the Custom security complexity?

0 days

24

What setting determines the number of unique new passwords that must be associated with a user account before an old password can be reused?

Enforce password history

25

To maintain the effectiveness of the password history, what should you do?

Do not allow passwords to be changed right after they were changed.

26

How do you prevent passwords from being changed after they were just changed?

By setting the Number of days in which a password cannot be reused security policy setting to 1.

27

What setting determines the minimum characters in the password?

Minimum password length.

28

What is the minimum value for password length?

5

29

What is the minimum password length for Eloqua security complexity?

6 characters

30

What is the minimum password length for Windows security complexity?

8 characters

31

What is the minimum password length for Custom security complexity?

5 characters

32

True or false: "Require at least one uppercase character" is enabled for all complexity levels.

True

33

True or false: "Require at least one lowercase character" is enabled for all complexity levels.

True

34

"Require at least one digit" is enabled for which complexity levels?

All

35

True or false: "Require at least one punctuation character" is enabled by default for all complexity levels.

False. It is disabled by default for all complexity levels.

36

"Password cannot contain more than 2 characters from the user name" - enabled or disabled for Eloqua security complexity?

Disabled

37

"Password cannot contain more than 2 characters from the user name" - enabled or disabled for Windows security complexity?

Enabled

38

"Password cannot contain more than 2 characters from the user name" - enabled or disabled for Custom security complexity?

Enabled

39

"Password cannot contain user's account name" - enabled or disabled for Eloqua security complexity?

Disabled

40

"Password cannot contain user's account name" - enabled or disabled for Windows security complexity?

Enabled

41

"Password cannot contain user's account name" - enabled or disabled for Custom security complexity?

Enabled

42

"Require the first character to be alphanumeric" mandates that the first character of a user's password must be ____ and cannot be a ___

alphanumeric and cannot be a special or Unicode character.

43

True or false: "Require the first character to be alphanumeric" is enabled for all complexity levels.

False - it is disabled

44

True or false: "Require the first character to be alphanumeric" is disabled by default for all complexity levels.

True

45

True or false: Eloqua offers a "Restrict login by IP address" option.

True

46

True or false: Eloqua provides you with options for configuring "Restrict Login By IP"

True.

47

What are the three options for configuring "Restrict Login by IP Address"?

By IP Range, Specific IP Block, By Network Mask.

48

What kind of environments would you be most likely to restrict login by IP address to a specific IP block?

Where IP addresses are not dynamically assigned.

49

How do you enter the "By Network Mask" option?

Enter the beginning IP address of the IP range you wish to add, followed by the network mask in slash notation.

50

Use the ____ section to define the timeframe and number of attempts after which a user must have their password reset.

Account Lockout Policy.

51

The Account Lockout Policy contains settings for: ____, Lockout effective period, Reset invalid login count after...

Maximum invalid login attempts

52

The default value for Maximum invalid login attempts is:

10

53

The default value for Lockout effective period is

5 minutes

54

If you set Lockout effective period to 0, what happens?

Account will be locked until an admin manually unlocks it.

55

The __ setting determines the number of minutes that must pass before the lockout threshold is reset.

Reset invalid login count after...

56

If Reset invalid login count after... is set to zero, what happens?

An admin must manually reset the account.

57

The Account Lockout Policy contains settings for: Maximum invalid login attempts, _____, Reset invalid login count after...

Lockout effective period

58

The Account Lockout Policy contains settings for: Maximum invalid login attempts, Lockout effective period, ______

Reset invalid login count after...

59

______ determines the duration after which a current session will expire in case of abandonment.

Session timeout value in minutes

60

The ____ includes Session Timeout value and Forgotten password reset time

Session Timeout Policy.

61

What is the default Session Timeout value?

120 minutes

62

The ___ determines the duration after which a user can get a new Forgot Password email.

Forgot password reset time

63

The default value for the Forgot password reset time in minutes is...

720 minutes (12 hours)

64

___ allows users to log into one product to access all their services.

SSO - Single Sign-on

65

Benefits of SSO: (1) ____ (2) productivity (3) easy policy implementation (4) reduced admin overhead

security

66

Benefits of SSO: (1) security (2) ____ (3) easy policy implementation (4) reduced admin overhead

productivity

67

Benefits of SSO: (1) security (2) productivity (3) ____ (4) reduced admin overhead

easy policy implementation

68

Benefits of SSO: (1) security (2) productivity (3) easy policy implementation (4) ____

reduced admin overhead

69

Why does SSO provide additional security?

Users will create a stronger password

70

3 steps to configuring SSO, in short

(1) Upload Metadata (2) Map the usernames (3) Download the Certificate

71

To access the SSO configuration page

Settings: Setup: Administration: Users

72

To upload Identity Provider Metadata

Single Sign-On down arrow: Identify Provider Settings

73

Where do you find the ACS and the Service Provider Entity URL?

On the Identity Provider Details page.

74

You will need the ACS and the Service Provider Entity URL when you...

Configure the SSO product

75

To map the usernames...

Identity Provider Details screen: Edit

76

What should you type in the "The name of the attribute that contains the user identity" field?

email

77

In mapping the usernames, under ____, select "The user identity is located in an assertion attribute value"

User Identity Location

78

Where do you download the certificate?

Single Sign-On down arrow: Certificate Setup

79

When you download the certificate, you should save it...

locally.

80

When a contact is uploaded to Eloqua, who has access to the contact?

All users.

81

3 examples of needing to control user access to contacts:

(1) Restricting access by business division or geography (3) Restricted access for Sales (4) Sharing access by business division or geography

82

__ indicate how you separate access to contacts

Categories

83

To restrict access based on Business Division and Geography, create what categories?

Business Division and Geography

84

Labels reside inside ___

categories

85

__ indicate the subdivisions under each category.

Labels

86

An example of labels is to create APAC, EMEA, and AMER labels under the _____

Region category.

87

The second step in Contact Security is to create __

security groups

88

You need to create ____ corresponding to each label to define the users that will have access to various contacts.

security groups

89

The third step in Contact Security is to map ____ to __

map security groups to labels

90

The fourth step in Contact Security is to assign ___ to __

assign labels to contacts.

91

To assign labels to contacts, you need to create a ___ that will evaluate the information in the Contact Records and assign a label.

program

92

If no label is assigned to a Contact Record, what happens?

The record will be available to all users.

93

What happens if a user is in multiple access security groups?

Then the user will be able to see all contacts for each security group.

94

What is recommended when configuring contact security?

Work with an Eloqua representative

95

where to find categories and labels?

Settings: Setup: Administration: Users: Contact Security down arrow: Manage Labels

96

The __ page is where you define categories and labels

Manage Labels

97

3 options to create security groups

(1) new (2) copy and repurpose (3) use out-of-the-box

98

The _____ security group does not have any actions or interface permissions.

standard Everyone

99

The ____ security group is strictly used for determining a user's __

contact access - not feature or function access.

100

True or false: You create a name and an acronym for security groups.

True.

101

The last step in creating security groups is...

add users to each security group.

102

Where do you assign labels?

Contact Security drop-down: Assign Labels

103

The program to examine Contact Records and assign labels is created using the _____ or _____ model.

shared or unique model

104

In the program to assign labels, what type of action should you choose for "Remove Labels"?

Ownership

105

7 types of actions under Program Builder are (1) ___ (2) Data Tools (3) Groups (4) Integration (5) Marketing Actions (6) Ownership (7) Program Maintenance

All

106

7 types of actions under Program Builder are (1) all (2) ___ (3) Groups (4) Integration (5) Marketing Actions (6) Ownership (7) Program Maintenance

Data Tools

107

7 types of actions under Program Builder are (1) all (2) Data Tools (3) _____ (4) Integration (5) Marketing Actions (6) Ownership (7) Program Maintenance

Groups

108

7 types of actions under Program Builder are (1) all (2) Data Tools (3) Groups (4) ____ (5) Marketing Actions (6) Ownership (7) Program Maintenance

Integration

109

7 types of actions under Program Builder are (1) all (2) Data Tools (3) Groups (4) Integration (5) _____ (6) Ownership (7) Program Maintenance

Marketing Actions

110

7 types of actions under Program Builder are (1) all (2) Data Tools (3) Groups (4) Integration (5) Marketing Actions (6) ___ (7) Program Maintenance

Ownership

111

7 types of actions under Program Builder are (1) all (2) Data Tools (3) Groups (4) Integration (5) Marketing Actions (6) Ownership (7) ____

Program Maintenance

112

What Action do you enter in Program Builder to remove labels?

Remove Contact Security Labels

113

How can you open a menu for editing decision steps?

Click the down arrow on the decision step.

114

In Program Builder, can you restrict the time actions run?

Yes.

115

True or false: you can allow Custom Objects in a program step.

True.

116

Because a contact will always remain in one geographic region, use the ____ Model to create a program to assign labels to contact records.

Unique

117

True or false: You can configure asset-level security in Eloqua.

True

118

____ allow you to control levels of access to assets, features, and interfaces.

Security groups

119

Access security groups from the User Management page:

Groups: All Groups ... displays Security Group Overview interface

120

Security Group overview: The ____ section allows you to define the products that users in the group can access

Licensing

121

Access to use the core platform requires the __ license.

Eloqua Marketing Platform

122

The ___ section controls the features and areas of the application that are visible to users in this group.

Interface Access

123

The Interface Access tree is organized...

in a hierarchy that matches the hierarchy of how you navigate the platform.

124

In Interface Access, if you are looking at a new security group or the Everyone security group, what is true?

No areas of the application are selected.

125

In Interface Access, there are default selections made for the ____ or _____ security groups.

System or Default

126

True or false: Access to assets set in Interface Access allow users to create, modify or delete the assets.

False. This is set in the Asset Creation section.

127

The ____ section of security group overview controls the actions that can be performed on a particular interface by users in this group.

Action Permissions section

128

The Action Permissions section is closely linked with the ____ section of the Security Group overview.

Interface Access

129

Security Group Overview 6 sections: (1) _____ (2) Interface Access (3) Action Permissions (4) Asset Creation (5) Default Asset Permissions (6) Business Unit Membership

Licensing

130

Security Group Overview 6 sections: (1) Licensing (2) ____ (3) Action Permissions (4) Asset Creation (5) Default Asset Permissions (6) Business Unit Membership

Interface Access

131

Security Group Overview 6 sections: (1) Licensing (2) Interface Access (3) _____ (4) Asset Creation (5) Default Asset Permissions (6) Business Unit Membership

Action Permissions

132

Security Group Overview 6 sections: (1) Licensing (2) Interface Access (3) Action Permissions (4) _____ (5) Default Asset Permissions (6) Business Unit Membership

Asset Creation

133

Security Group Overview 6 sections: (1) Licensing (2) Interface Access (3) Action Permissions (4) Asset Creation (5) ______ (6) Business Unit Membership

Default Asset Permissions

134

Security Group Overview 6 sections: (1) Licensing (2) Interface Access (3) Action Permissions (4) Asset Creation (5) Default Asset Permissions (6) _____

Business Unit Membership

135

The __ section of the Security Group Overview controls the actions that can be performed on a particular interface by users in this group.

Action Permissions

136

The _____ section identifies the types of assets that users of this group have the ability to create.

Asset Creation

137

The _____ section controls the default permissions applied to an asset.

Default Asset Permissions

138

If you want to only allow the user who created an asset to edit or delete it, what section of the Security Group Overview would you use?

Default Asset Permissions

139

The ____ section of the Security Group Overview can select which business unit users will be members of.

Business Unit Membership

140

The Business Unit Membership is only applicable if...

Categories have been configured for business units.

141

When a user creates a new asset, there are a default set of permissions on that asset. True or false?

True.

142

What are the four levels of security that users or security groups can have over an asset?

View, Edit, Delete, Security

143

In the ____ level of asset permissions, users can change the asset permissions.

Security

144

From the Security Group Overview, where do you assign permissions?

Click Default Asset Permissions, and click edit.

145

The __ allows you to secure the entire email template so it cannot be modified, or only mark certain sections as edited.

Email Template Manager

146

Where is email template manager:

Assets: Emails: Template Manager icon

147

Create an email template as you would create...

any email.

148

After saving as a template, what do you do to mark some of the template as protected?

Gear menu: Enable Protected Mode

149

How do you mark some sections as editable?

Right-click on the component and select Mark as Editable.

150

True or false: When you mark a component as editable you can allow it to be deleted.

True.

151

How are editable sections marked in a template?

With a blue line around them.

152

What feature of the Email Template allows you to lock an entire email asset or mark certain sections as editable?

Protected Mode

153

Configuring __ security insures information confidentiality and system integrity.

User Security

154

Configuring __ leads to effective resource utilization.

SSO

155

Configuring ____ allows you to implement cost effective guardrails to prevent against unauthorized access and disclosure.

Contact Security

156

Configuring ___ allows you to define permissions for each asset type against unauthorized deletion or modification.

Asset Security