
Security + (SY0-501) Domain 4
Authored by Brett Glines
Other
Professional Development
Used 85+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
QUESTION 102 Which of the following access management concepts is associated with file permissions?
A. Authentication
B. Accounting
C. Authorization
D. Identification
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
QUESTION 177 Users from two organizations, each with its own PKI, need to begin working together on a joint project. Which of the following would allow the users of the separate PKIs to work together without connection errors?
A. Trust model
B. Stapling
C. Intermediate CA
D. Key Escrow
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
QUESTION 34 Which of the following BEST implements control diversity to reduce the risks associated with the authentication of employees into company resources?
A. Enforcing the use of something you know and something you have for authentication
B. Requiring employees to sign the company's password and acceptable use policies
C. Implementing LDAP authentication for some systems and RADIUS authentication for others
D. Publishing a password policy and enforcing password requirements via a GPO
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
QUESTION 40 The Chief Information Security Officer (CISO) of an organization has tasked the security analysis team with researching and developing a multifactor authentication alternative to the existing single-factor version. The team decides that multifactor, for this organization, will mean three separate and distinct authentication methods. Which of the following options BEST meets this requirement?
A. Retina scan, blood sample, token
B. Token, certificate, voice recognition
C. Fingerprint, token, challenge question
D. PIV, token, challenge question
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
QUESTION 6 Company A has acquired Company B. Company A has different domains spread globally, and typically migrates its acquisitions infrastructure under its own domain infrastructure. Company B, however, cannot be merged into Company A's domain infrastructure. Which of the following methods would allow the two companies to access one another's resources?
A. Attestation
B. Federation
C. Single sign-on
D. Kerberos
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
QUESTION 97 Which of the following access management concepts is MOST closely associated with the use of a password or PIN?
A. Authorization
B. Authentication
C. Accounting
D. Identification
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
QUESTION 136 A security analyst is mitigating a pass-the-hash vulnerability on a Windows infrastructure. Given the requirement, which of the following should the security analyst do to MINIMIZE the risk?
A. Enable CHAP
B. Disable NTLM
C. Enable Kerberos
D. Disable PAP
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?