Chapter 2
What are the three different meanings of MAC within the context of CompTIA Security+
What does a high False Rejection Rate (FRR) in a biometric system indicate?
Which of the following statements about embedded certificates in smart cards is true?
What does ’Account lockout threshold’ refer to in the context of account lockout policies on Microsoft systems?
What is a DACL in the context of Microsoft Systems?
What is the concept of just-in-time administration in the context of Privileged Access Management?
What does an iris scanner use for recognition and how does it capture this information?
What does the ’Subject’ typically refer to in an ABAC policy?
Which element is NOT typically included in an ABAC policy statement?
What permissions does an administrator have in Microsoft Project Server?
Why is it necessary to change default passwords on systems and devices before usage?
What is the benefit of requiring administrators to use two accounts?
What capabilities does the ’Full control’ NTFS permission provide to users?
What does the ’Read & execute’ permission allow a user to do in a Microsoft NTFS filesystem?
What does ’True rejection’ refer to in the context of biometric systems?
Which is an example of a signal used in Microsoft’s Conditional Access policies within Active Directory environments?
Why should personnel not use shared or generic accounts according to account management policies?
Which group of technologies is most commonly used in the ’Somewhere You Are’ authentication attribute?
What is the role of an owner in the discretionary access control (DAC) scheme?
In SAML, what is the function of the Principal?
In the role-BAC scheme, how do administrators commonly grant access?
What does the NIST SP-800-63B state about two-step authentication via SMS?
What is a characteristic of gait analysis as a method of biometric authentication?
What are the four elements typically included in an Attribute-Based Access Control (ABAC) policy statement?
What are some of the requirements for Kerberos to work properly?
What does ’Account lockout duration’ refer to in the context of Microsoft system security policies?
What is a common signal used within Conditional Access policies in Microsoft’s Azure Active Directory environments?
What is the level of access typically granted to ’Team Members’ in a role-Based Access Control (BAC) scheme on a Microsoft Project Server?
What does the ’Modify’ permission enable users to do in NTFS?
What is the principle called which suggests giving the users only the account permissions they need to perform their job?
What does the Mandatory Access Control (MAC) scheme use to determine access?
Which of the following best describes a strong password according to the text?
What is the role of an Identity provider (IdP) in the context of Security Assertion Markup Language (SAML)?
What does the term ’someone you know’ imply in the context of cybersecurity and trust models?
What does the ’Something You Have’ authentication factor refer to in CompTIA Security+ SY0-701?
What is the primary purpose of SSO?
What does ’False acceptance’ in a biometric system refer to?
What does the ’something you are’ authentication factor use for authentication?
What is the role of the Key Distribution Center (KDC) in the Kerberos network authentication mechanism?
What is the recommended procedure for managing user accounts when an employee is on an extended leave of absence according to the material?
What are the characteristics of a service account in the context of credential policies?
What is the role of a Service Provider in Security Assertion Markup Language (SAML)?
What does the concept of ’’Roles Based on Jobs and Functions’ imply in the context of an organization with multiple departments?
In the context of an organization’s disablement policy, why is disabling preferred over deleting the account for a terminated employee?
What are some of the security features provided by smart cards?
Which of the following best describes the ’Object’ in an Attribute-Based Access Control (ABAC) scheme?
What are some objections to using retina scanners for biometric authentication?
What does ’True acceptance’ mean in the context of a biometric system?
What is the primary function of a federated identity management system in single sign on (SSO) systems?
What is the primary purpose of authentication in an IT security context?
Why are shared accounts discouraged in account management policies?
What is one of the common signals that Conditional Access policies use in a Microsoft Azure Active Directory environment?
What is a key difference between HMAC-based One-Time Password (HOTP) and Time-based One-Time Password (TOTP)?
What might be a possible reason for organizations to prefer disabling user accounts over deleting them?
Which of the following is NOT one of the access control schemes mentioned in the text?
What is the term for when a biometric system incorrectly rejects a recognized user?
Who is responsible for defining the access for subjects and objects in a system?
Why is it often detrimental to security if users constantly reuse the same password?
What are important aspects of password security that organizations should provide training on, according to the text?
What does the ’Something You Can Do’ authentication factor refer to in terms of Microsoft Windows 10?
Which role in SAML is an entity providing services to principals?
In an Attribute-Based Access Control (ABAC) system, what does the Action element represent?
Which type of account is most often associated with regular users or the personnel working in organizations?
What is the primary benefit of Single sign-on (SSO) in a network?
What is a primary function of a password vault?
What is typically considered as ’Subjects’ in an access control scheme?
Which of the following is NOT a key characteristic of voice recognition as a method of biometric authentication?
What does the ’Write’ permission allow in NTFS?
What is an example of a dynamic rule in rule-based access control?
What is the role of objects in an access control scheme?
What is the difference between Static KBA and Dynamic KBA?
What is the first step in a biometric authentication system?
What is the role of ’Executives’ in Microsoft Project Server?
Why does Kerberos version 5 require all systems to be synchronized and within five minutes of each other?
Within the context of authentication attributes, what is an example of ’Something You Exhibit’?
What is the purpose of labels in the MAC scheme?
What is the function of the VIP Access app created by Symantec, as utilized within authentication applications?
Why is it often required by account management policies for each user to have at least one account?
What does a password expiration setting identifies?
What is the primary benefit of OpenID Connection (OIDC) for an application?
Which of the following descriptions correctly defines the term ’Accounting’ in the context of AAA?
Why might an organization prefer to disable a user account rather than deleting it?
What is the purpose of the constantly changing number displayed on a token key?
What does the ’Modify’ permission in NTFS allow a user to do?
Which of the following statements about shared and generic account/credentials is true?
What is commonly done with the Guest account in most organizations, according to the text?
Which of the following is NOT a characteristic used by facial recognition systems in biometrics?
In the role-BAC scheme in Microsoft Project Server, what level of access do Project Managers have?
Which authentication factor does the ’something you know’ category typically refer to?
Which type of account pertains to external entities that have access to a network?
What is the function of a time-based login?
Which of the following best describes the ’Read & execute’ NTFS permission in Linux?
What information can be determined from authentication log entries?
Why should administrators avoid using shared or generic accounts?
What type of biometric authentication method is commonly used by laptop computers, smartphones and USB flash drives?
What does the DAC scheme emphasis regarding object ownership within the Microsoft NTFS system?
What type of account commonly requires long, complex passwords that should not expire?
What is a common goal of authentication services that prevents unencrypted credentials from being sent across a network?
What is the main function of role-Based Access Control?
How do vein matching systems in biometric authentication work?
What is the primary purpose of Authentication attributes in system security?
What do credential policies require for administrator and root accounts?
What is one of the requirements for Kerberos to work properly?
What are the main functions of the embedded certificates in a smart card?
What are the additional requirements for a service account set by credential policies?
What is the role of the Key Distribution Center (KDC) in Kerberos authentication?
Why are shared or generic accounts often prohibited in account management policies?
What is the least secure form of authentication factor?
What is the purpose of an account audit?
What is a fundamental feature of Microsoft’s Conditional Access within Azure Active Directory environments?
What are the uses of Password Keys?
Last updated