which of the following?
A user attempting to log on to a workstation for the first time is prompted for the following information
before being granted access: username, password, and a four-digit security pin that was mailed to him
during account registration. This is an example of which of the following?
Which of the following allows a network administrator to implement an access control policy based on individua
Which of the following allows a network administrator to implement an access control policy based on
individual user characteristics and NOT on job function?
Which of the following is best practice to put at the end of an ACL?
Which of the following is best practice to put at the end of an ACL?
Which of the following is blocking network printing?
Users report that they are unable to access network printing services. The security technician checks the
router access list and sees that web, email, and secure shell are allowed. Which of the following is
blocking network printing?
select the appropriate authentication category from the dropdown choices.
Which of the following authentication methods is Sara using?
In order for Sara, a client, to logon to her desktop computer, she must provide her username, password,
and a four digit PIN. Which of the following authentication methods is Sara using?
which of the following authentication types?
The security department has implemented a new laptop encryption product in the environment. The
product requires one user name and password at the time of boot up and also another password after
the operating system has finished loading. This setup is using which of the following authentication types?
which rates the ability of a system to correctly authenticate an authorized user?
Which of the following is a measure of biometrics performance which rates the ability of a system to
correctly authenticate an authorized user?
which of the following?
Use of group accounts should be minimized to ensure which of the following?
Which of the following should the system administrator implement to accomplish this task?
The system administrator is tasked with changing the administrator password across all 2000 computers
in the organization. Which of the following should the system administrator implement to accomplish this
task?