Which of the following authentication methods is Sara using?
In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a
four-digit PIN.
Which of the following authentication methods is Sara using?
Which of the following is blocking network printing?
Users report that they are unable to access network printing services. The security technician checks the router
access list and sees that web, email, and secure shell are allowed. Which of the following is blocking network
printing?
Which of the following is the best practice to put at t…
Which of the following is the best practice to put at the end of an ACL?
Which of the following allows a network administrator t…
Which of the following allows a network administrator to implement an access control policy based on individual
user characteristics and NOT on job function?
Which of the following is this an example of?
A user attempting to log on to a workstation for the first time is prompted for the following information before
being granted access: username, password, and a four-digit security pin that was mailed to him during account
registration.Which of the following is this an example of?
Which of the following would accomplish this?
A company wants to ensure that all credentials for various systems are saved within a central database so that
users only have to login once for access to all systems. Which of the following would accomplish this?
Which of the following is being described?
After Ann, a user, logs into her banking websites she has access to her financial institution mortgage, credit
card, and brokerage websites as well. Which of the following is being described?
Which of the following is commonly LDAP and Kerberos us…
Which of the following is commonly LDAP and Kerberos used for?
Which of the following should the security technician r…
A security technician has been asked to recommend an authentication mechanism that will allow users to
authenticate using a password that will only be valid for a predefined time interval. Which of the following should
the security technician recommend?
Which of the following type of authentication mechanism…
An organization has introduced token-based authentication to system administrators due to risk of password
compromise. The tokens have a set of numbers that automatically change every 30 seconds. Which of the
following type of authentication mechanism is this?