Chapter 11 NSS

Is this your test? Login to manage it. If not, you can create an assessment just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
__________ in access control means that if a condition is not explicitly met, then access is to be rejected.
2.
1 point
Which of these is a set of permissions that is attached to an object?
3.
1 point
How is the Security Assertion Markup Language (SAML) used?
4.
1 point
A process functioning on behalf of the user who attempts to access a file is known as a(n) ________.
5.
1 point
A(n) ________ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its contents.
6.
1 point
What is the version of the X.500 standard that runs on a personal computer over TCP/IP?
7.
1 point
In the Mandatory Access Control (MAC) model, every subject and object ________.
8.
1 point
With the development of IEEE 802.1x port security, the _______ authentication server has seen even greater usage.
9.
1 point
A user entering her user name would correspond to the action in access
control.
10.
1 point
Which authentication protocol is available as a free download that runs on Microsoft Windows, Apple Mac OS X, and Linux?
11.
1 point
What is the name given to the individual who periodically reviews security settings and maintains records of access by users?
12.
1 point
Which of these is NOT part of the makeup of the AAA elements in network security?
13.
1 point
A RADIUS authentication server requires that the _____ be authenticated first.
14.
1 point
Which statement about Rule Based Access Control is true?
15.
1 point
The principle known as ________ in access control means that each user should be given only the minimal amount of privileges necessary for that person to perform his job function.
16.
1 point
What is the current version of TACACS?
17.
1 point
Which Microsoft Windows feature provides centralized management and configuration of computers and remote users who are using Active Directory?
18.
1 point
What is the least restrictive access control model?
19.
1 point
A(n) ________ is the person who is responsible for the information, determines the level of security needed for the data, and delegates security duties as required.
20.
1 point
In the ________ model, the end-user cannot change any security settings.