quiz 9 Flashcards

1
Q

DAC is an access control policy generally determined by the owner.

A

True—Discretionary access control (DAC) is an access control policy generally determined by the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

. Lattice-based access control is an example of role-based access control.

A

False—Lattice-based access control is an example of mandatory access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Least privilege is a concept that denies all traffic to a resource unless the user is specifically granted access to that resource.

A

False—Least privilege is when users are given only the amount of privileges needed to do their job. The concept that denies all traffic unless specifically granted is known as implicit deny.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Separation of duties is when more than one person is required to complete a task.

A

True—Separation of duties is employed so that one person will not have too much control; multiple people are needed to complete an operation or task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

One of the reasons to have job rotation implemented is to increase employee boredom.

A

False—Job rotation is implemented to reduce employee boredom and to increase user insight and enhance employee skill level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Active Directory Users and Computers can be used to add organizational units to a domain.

A

True—Active Directory Users and Computers is used to add organizational units, users, groups, and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Full control is a type of NTFS permission that might be enabled within an access control list.

A

True—Full control is one of the NTFS permissions you would find within an ACL, or access control lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To change permissions on a file in Linux, you would use the chmod commands.

A

True—Linux uses the chmod command to change permissions; a common number used is 755.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If a child folder is inheriting its permissions from a parent folder, it could be said that the parent is propagating those permissions to the child.

A

True—When the child folder or subfolder inherits permissions from a parent folder, that parent is propagating those permissions to the subfolder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you move a folder to a different location on the same volume, that folder will lose its permissions.

A

False—if you move a folder to a different location on the same volume, the folder retains its original permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following should be included in a password to make it complex? (Select the three best answers.) 
A. Uppercase letters 
B. Numbers 
C. Special characters 
D. Function keys
A

A, B, and C. Uppercase letters, numbers, and special characters should all be included in a password to make it complex. You cannot use function keys (for example, F10) within a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Of the following, what are two good ways to protect the computer? (Select the two best answers.)
A. Verify that the guest account is disabled.
B. Rename and password protect the administrator account.
C. Delete the administrator account.
D. Remove password policies.

A

A and B. Verifying that the guest account, and any other unnecessary accounts, is disabled and renaming a password protecting the administrator account are good ways to protect the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Maximum and minimum password age" is part of which of the following? 
A. Organizational unit 
B. Group policy editor 
C. Password policy 
D. Registry
A

C. The password policy includes lots of settings including Maximum and Minimum Password Age.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following keeps every user in a standard user mode instead of as an administrator, even if the user is a member of the administrators group? 
A. Password policy 
B. Administrator policy 
C. Vista access control 
D. User account control
A

D. User Account Control (UAC) is a component of Windows Server 2008, Windows Vista, and Windows 7 that keeps every user (besides the actual administrator account) in standard user mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following is the strongest password? 
A. |ocrian# 
B. Marqu1sD3S0d 
C. This1sV#ryS3cure 
D. Thisisverysecure
A

C. This1sV#ryS3cure incorporates case-sensitive letters, numbers, and special characters, and is 16-characters long. The other answers do not have the complexity of answer C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
What key combination helps to secure the logon process? 
A. Windows+R 
B. Ctrl+Shift+Esc 
C. Ctrl+Alt+Del 
D. Alt+F4
A

C. Ctrl+Alt+Del is the key combination that helps secure the logon process. It can be added by configuring the Local Security policy.

17
Q
In a discretionary access control model, who is in charge of setting permissions to a resource? 
A. Owner of the resource 
B. Administrator 
C. Any user of the computer
D. Administrator and the owner
A

A. In the discretionary access control model (DAC), the owner of the resource is in charge of setting permissions. In a mandatory access control model, the administrator is in charge.

18
Q
Which of the following is an access control policy determined by a computer system and not by a user or owner? 
A. DAC 
B. MAC 
C. RBAC 
D. Discretionary security policy
A

B. MAC (mandatory access control) is an access control policy determined by a computer system and not by a user or an owner. DAC and RBAC are access control policies determined by people.

19
Q
Lattice-based access control is an example of what type of access control policy? 
A. DAC 
B. RBAC 
C. MAC 
D. Rule-based access control
A

C. Lattice-based access control and rule-based access control are examples of the policy called Mandatory Access Control.

20
Q
Which of the following access control policies is based on sets of permissions involved in an operation? 
A. DAC 
B. RBAC 
C. MAC 
D. Rule-based access control
A

B. RBAC (role-based access control) is based on sets of permissions involved in an operation; it is based on roles.