Which of the following is the difference between identification and authentication of a user?
Which of the following is the difference between identification and authentication of a user?
Which of the following is MOST accurate in describing the type of issue the administrator is experiencing?
A network administrator has a separate user account with rights to the domain administrator group.
However, they cannot remember the password to this account and are not able to login to the server
when needed. Which of the following is MOST accurate in describing the type of issue the administrator is
experiencing?
Which of the following controls can she implement to address this concern?
Ann works at a small company and she is concerned that there is no oversight in the finance department;
specifically, that Joe writes, signs and distributes paycheques, as well as other expenditures. Which of the
following controls can she implement to address this concern?
Which of the following BEST describes this level of access control?
A security administrator implements access controls based on the security classification of the data and
need-to-know information. Which of the following BEST describes this level of access control?
Which of the following presents the STRONGEST access control?
Which of the following presents the STRONGEST access control?
Which of the following is being implemented?
A user reports being unable to access a file on a network share. The security administrator determines
that the file is marked as confidential and that the user does not have the appropriate access level for
that file. Which of the following is being implemented?
Which of the following common access control models is commonly used on systems to ensure a "need to know
Which of the following common access control models is commonly used on systems to ensure a “need
to know” based on classification levels?
Which of the following access controls enforces permissions based on data labeling at specific levels?
Which of the following access controls enforces permissions based on data labeling at specific levels?
Which of the following types of access control would this reflect?
Joe Has read and write access to his own home directory. Joe and Ann are collaborating on a project, and
Joe would like to give Ann write access to one particular file in this home directory. Which of the following
types of access control would this reflect?
which of the following control types?
The IT department has setup a share point site to be used on the intranet. Security has established the
groups and permissions on the site. No one may modify the permissions and all requests for access are
centrally managed by the security team. This is an example of which of the following control types?