Which of the following access controls enforces permissions based on data labeling at specific levels?
Which of the following access controls enforces permissions based on data labeling at specific
levels?
Which of the following types of access control would this reflect?
Joe Has read and write access to his own home directory. Joe and Ann are collaborating on a
project, and Joe would like to give Ann write access to one particular file in this home directory.
Which of the following types of access control would this reflect?
which of the following control types?
The IT department has setup a share point site to be used on the intranet. Security has
established the groups and permissions on the site. No one may modify the permissions and all
requests for access are centrally managed by the security team. This is an example of which of
the following control types?
which of the following should the security technician respond?
A security technician is working with the network firewall team to implement access controls at the
company’s demarc as part of the initiation of configuration management processes. One of the
network technicians asks the security technician to explain the access control type found in a
firewall. With which of the following should the security technician respond?
which of the following should the security technician respond?
A security technician is working with the network firewall team to implement access controls at the
company’s demarc as part of the initiation of configuration management processes. One of the
network technicians asks the security technician to explain the access control type found in a
firewall. With which of the following should the security technician respond?
which of the following information is MOST likely required?
During the information gathering stage of a deploying role-based access control model, which of
the following information is MOST likely required?
which of the following information is MOST likely required?
During the information gathering stage of a deploying role-based access control model, which of
the following information is MOST likely required?
Which of the following configurations will meet the requirements?
A company hired Joe, an accountant. The IT administrator will need to create a new account for
Joe. The company uses groups for ease of management and administration of user accounts.
Joe will need network access to all directories, folders and files within the accounting department.
Which of the following configurations will meet the requirements?
Which of the following would be the MOST appropriate strategy for securing the server?
Users require access to a certain server depending on their job function. Which of the following
would be the MOST appropriate strategy for securing the server?
Which of the following controls is preventing them from completing their work?
The company’s sales team plans to work late to provide the Chief Executive Officer (CEO) with a
special report of sales before the quarter ends. After working for several hours, the team finds they
cannot save or print the reports.
Which of the following controls is preventing them from completing their work?