which of the following should the security technician r…
A security technician is working with the network firewall team to implement access controls at the company’s
demarc as part of the initiation of configuration management processes. One of the network technicians asks
the security technician to explain the access control type found in a firewall. With which of the following should
the security technician respond?
Which of the following control types is this an example of?
The IT department has set up a share point site to be used on the intranet. Security has established the groups
and permissions on the site. No one may modify the permissions and all requests for access are centrally
managed by the security team.
Which of the following control types is this an example of?
Which of the following types of access control would th…
Joe has read and write access to his own home directory. Joe and Ann are collaborating on a project, and Joe
would like to give Ann write access to one particular file in this home directory. Which of the following types of
access control would this reflect?
Which of the following access controls enforces permiss…
Which of the following access controls enforces permissions based on data labeling at specific levels?
Which of the following common access control models is …
Which of the following common access control models is commonly used on systems to ensure a “need to
know” based on classification levels?
Which of the following is being implemented?
A user reports being unable to access a file on a network share. The security administrator determines that the
file is marked as confidential and that the user does not have the appropriate access level for that file. Which of
the following is being implemented?
Which of the following presents the STRONGEST access co…
Which of the following presents the STRONGEST access control?
Which of the following BEST describes this level of acc…
A security administrator implements access controls based on the security classification of the data and needto-know information. Which of the following BEST describes this level of access control?
Which of the following controls can she implement to ad…
Ann works at a small company and she is concerned that there is no oversight in the finance department;
specifically, that Joe writes, signs and distributes paycheques, as well as other expenditures. Which of the
following controls can she implement to address this concern?
Which of the following is MOST accurate in describing t…
A network administrator has a separate user account with rights to the domain administrator group. However,
they cannot remember the password to this account and are not able to login to the server when needed.
Which of the following is MOST accurate in describing the type of issue the administrator is experiencing?