Which of the following information is typically not included in an access token?

TestOut SecurityPro (8.2-8.5)

Quiz
•
Computers
•
University
•
Hard

James Stephens
Used 8+ times
FREE Resource
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
User security identifier
Group memebership
User rights
User account password
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?
Proxy
Access token
Account policy
Cookie
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder.
Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Manager's group.
What should you do? (8.3)
Add his user account to the ACL for the shared folder
Have Marcus log off and log back in
Manually refresh Group Policy settings on his computer
Manually refresh Group Policy settings on the file server
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.3) Which security mechanism uses a unique list that meets the following specifications?
- The list is embedded directly in the object itself
- The list defines which subjects have access to certain objects
- The list specifies the level or type of access allowed to certain objects
Hasing
Kerberos
User ACL
Mandatory access control
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.4) You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?
ActiveX
Server-side scripts
CGI
Client-side scripts
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.4) A programmer that fails to check the length of input before processing leaves their code vulnerable to what form of common attack?
Privilege escalation
Session hijacking
Buffer overflow
Backdoor
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.4) Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information?
Drive-by download
SQL injection
XSS
DLL injection
Create a free account and access millions of resources
Similar Resources on Quizizz
17 questions
L7 MSC Network Security Quiz

Quiz
•
University
18 questions
Introduction to Database

Quiz
•
University
20 questions
KAMALUDDEEN IBRAHIM YARIMA

Quiz
•
University
20 questions
IT Essential Chapter 5 Windows Installations

Quiz
•
University
15 questions
Vulnerability Research and Tools

Quiz
•
University
20 questions
cyber awareness

Quiz
•
University
15 questions
Security+ SY0-701

Quiz
•
University
15 questions
N4 Theory - 2

Quiz
•
12th Grade - University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade