
Implementing Authentication and Authorization
Authored by Usama Yehia Ibrahim
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization needs a system for restricting access to files based on the sensitivity of the information in those files. You might suggest which of the following access control systems?
Discretionary access control
Mandatory access control
Confidential access control
File-based access control
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes a major difference between NTFS and FAT32 file systems?
NTFS supports user-level access differentiation.
FAT32 supports group-level access differentiation.
FAT32 natively encrypts files and directories.
NTFS logs all file access using secure tokens.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization has grown too large to support assigning permissions to users individually. Within your organization, you have large groups of users who perform the same duties and need the same type and level of access to the same files. Rather than assigning individual permissions, your organization may wish to consider using which of the following access control methods?
Group-based access control
Shift-based access control
Role-based access control
File-based access control
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ticket-granting server is an important element in which of the following authentication models?
802.1X
RADIUS
TACACS+
Kerberos
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an open standard that uses security tokens and assertions and allows you to access multiple websites with one set of credentials?
PAP
CHAP
SSO
SAML
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What protocol is used for RADIUS?
UDP
NetBIOS
TCP
Proprietary
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are accounts with greater than “normal” user access called?
Privileged accounts
System accounts
Superuser accounts
Audit accounts
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Latihan TIK
Quiz
•
Professional Development
10 questions
CodeMonkey Platform Management & Resources
Quiz
•
Professional Development
10 questions
Y9 App Lab Assessment
Quiz
•
Professional Development
10 questions
Physical Security Controls
Quiz
•
Professional Development
15 questions
Computer basics for beginners
Quiz
•
Professional Development
10 questions
GUESS THAT WORD IN CYBER!
Quiz
•
Professional Development
9 questions
Power BI Introduction and Connecting with Data Sources
Quiz
•
Professional Development
15 questions
Sec+ CH.2 Review Test
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...