Which of the following is an XML based open standard used in the exchange of authentication and authorization
Which of the following is an XML based open standard used in the exchange of authentication and
authorization information between different parties?
Which of the following is an authentication method that can be secured by using SSL?
Which of the following is an authentication method that can be secured by using SSL?
which of the following?
A user ID and password together provide which of the following?
which of the following?
The fundamental information security principals include confidentiality, availability and which of the
following?
Which of the following is the difference between identification and authentication of a user?
Which of the following is the difference between identification and authentication of a user?
Which of the following is MOST accurate in describing the type of issue the administrator is experiencing?
A network administrator has a separate user account with rights to the domain administrator group.
However, they cannot remember the password to this account and are not able to login to the server
when needed. Which of the following is MOST accurate in describing the type of issue the administrator is
experiencing?
Which of the following controls can she implement to address this concern?
Ann works at a small company and she is concerned that there is no oversight in the finance department;
specifically, that Joe writes, signs and distributes paycheques, as well as other expenditures. Which of the
following controls can she implement to address this concern?
Which of the following BEST describes this level of access control?
A security administrator implements access controls based on the security classification of the data and
need-to-know information. Which of the following BEST describes this level of access control?
Which of the following presents the STRONGEST access control?
Which of the following presents the STRONGEST access control?
Which of the following is being implemented?
A user reports being unable to access a file on a network share. The security administrator determines
that the file is marked as confidential and that the user does not have the appropriate access level for
that file. Which of the following is being implemented?