+1835 731 5494 Email: instantessays65@gmail.com

CIS 502 Week 1 Chapter 1 Quiz 100 Correct

$12.99

CIS 502 Week 1 Chapter Q: Which of the following is an encrypted message that provides proof that a user is authorized to access an object? Password Ticket Biometrics Federated identity Q: Consider the following scenario: An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within the company and has retained privileges from each of the jobs that he’s had during his tenure. Recently, he has been admonished for making unauthorized changes to systems. He once again made an unauthorized change and this change resulted in an unexpected outage. Management decided to terminate his employment at the company. He was allowed to come back to work the following day to clean out his desk and belongings, and during this time he installed a malicious script that was scheduled to run as a logic bomb on the first day of the following month. The script will change administrator passwords, delete files, and shut down over 100 servers in the data center. Which of the following basic principles was violated while the administrator was employed? Least privilege Implicit deny Loss of availability Defensive privileges Q: Consider the following scenario: An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within the company and has retained privileges from each of the jobs that he’s had during his tenure. Recently, he has been admonished for making unauthorized changes to systems. He once again made an unauthorized change and this change resulted in an unexpected outage. Management decided to terminate his employment at the company. He was allowed to come back to work the following day to clean out his desk and belongings, and during this time he installed a malicious script that was scheduled to run as a logic bomb on the first day of the following month. The script will change administrator passwords, delete files, and shut down over 100 servers in the data center. What could have discovered problems with this user’s account while he was employed? Account review Policy requiring strong authentication Multifactor authentication Logging Q: Which of the following access control models allows the resource owner to control other users’ accesses to the resource? Discretionary access control Role-based access control Mandatory access control Rule-based access control Q: Which of the following is also referred to as non-discretionary access control? WEP WPA2 LBAC RBAC Q: In what manner should an access control model mainly work? Preventive Recovery Corrective Detective Q: Which of the following is another name for crossover error rate (CER)? False accept rate Equal error rate Failure to enroll rate Failure to capture rate Q: Which of the following access controls modifies the environment to return systems to normal after an unwanted or unauthorized activity has occurred? Detective Compensation Corrective Preventive Q: Which of the following is a table that contains subjects, objects, and assigned privileges? Access control list Capability table Capacity table Access control matrix Q: What does TACACS stand for? Terminal Authorized Control Access Cyber System Terminal Access Controller Access Control System Terminal Adapter Controlling Access Control System Transfer Access Controller Auto Control System Q: Which of the following is the collection of tasks and duties that are involved in managing accounts, access, and accountability during the life of the account? Account policy User policy Access control administration Buffer overflow . Q: Which of the following is the process used to verify that the claimed identity is valid? Authorization Authentication Nonrepudiation Accountability Q: Which of the

Reviews

There are no reviews yet.

Be the first to review “CIS 502 Week 1 Chapter 1 Quiz 100 Correct”

Your email address will not be published. Required fields are marked *