
Sign up to save your podcasts
Or
Domain 3: Access Control Concepts
A. Security guards
B. Biometric authentication
C. Passwords
D. Fire alarms
Answer: C
A. Two or more forms of authentication from different categories
B. The same password used in multiple places
C. Multiple users authenticating simultaneously
D. A combination of encryption methods
Answer: A
A. Discretionary Access Control (DAC)
B. Role-Based Access Control (RBAC)
C. Attribute-Based Access Control (ABAC)
D. Mandatory Access Control (MAC)
Answer: B
A. Attribute-Based Access Control (ABAC)
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)
Answer: A
A. Discretionary Access Control (DAC)
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Attribute-Based Access Control (ABAC)
Answer: C
A. Giving users only necessary permissions
B. Allowing administrators unlimited access
C. Preventing user account creation
D. Implementing mandatory security clearances
Answer: A
A. Granted only during specific hours
B. Determined by user role
C. Restricted to known locations
D. Granted after authentication expires
Answer: A
A. Firewall
B. Directory Service
C. Proxy Server
D. Load Balancer
Answer: B
A. Brute force
B. Replay attack
C. Session hijacking
D. Phishing
Answer: C
A. Discretionary Access Control (DAC)
B. Mandatory Access Control (MAC)
C. Role-Based Access Control (RBAC)
D. Attribute-Based Access Control (ABAC)
Answer: A
A. Encrypt files
B. Enforce secure password creation/management
C. Monitor login attempts
D. Limit account creation
Answer: B
A. Password
B. Smart card
C. Biometrics
D. PIN
Answer: B
A. Loss of password integrity
B. Violation of encryption standards
C. Increased bandwidth usage
D. Unauthorized access
Answer: D
A. Block malicious traffic
B. Prevent brute force attacks
C. Encrypt sensitive data
D. Monitor login attempts
Answer: B
A. Attribute-Based Access Control (ABAC)
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)
Answer: A
A. Enhance encryption
B. Verify physical characteristics
C. Monitor network traffic
D. Backup critical data
Answer: B
A. Privilege escalation
B. Time-bound access
C. User provisioning
D. Conditional access
Answer: B
A. Malware
B. Social engineering
C. Phishing
D. Keylogging
Answer: B
A. Multi-factor authentication
B. Password history policies
C. Single sign-on
D. Encryption
Answer: B
A. Block unauthorized users
B. Record access attempts
C. Update user roles
D. Enforce encryption
Answer: B
A. Detect malware
B. Filter traffic between networks
C. Encrypt sensitive information
D. Manage bandwidth
Answer: B
A. Man-in-the-middle
B. Phishing
C. Denial of Service (DoS)
D. Replay
Answer: C
Domain 3: Access Control Concepts
A. Security guards
B. Biometric authentication
C. Passwords
D. Fire alarms
Answer: C
A. Two or more forms of authentication from different categories
B. The same password used in multiple places
C. Multiple users authenticating simultaneously
D. A combination of encryption methods
Answer: A
A. Discretionary Access Control (DAC)
B. Role-Based Access Control (RBAC)
C. Attribute-Based Access Control (ABAC)
D. Mandatory Access Control (MAC)
Answer: B
A. Attribute-Based Access Control (ABAC)
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)
Answer: A
A. Discretionary Access Control (DAC)
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Attribute-Based Access Control (ABAC)
Answer: C
A. Giving users only necessary permissions
B. Allowing administrators unlimited access
C. Preventing user account creation
D. Implementing mandatory security clearances
Answer: A
A. Granted only during specific hours
B. Determined by user role
C. Restricted to known locations
D. Granted after authentication expires
Answer: A
A. Firewall
B. Directory Service
C. Proxy Server
D. Load Balancer
Answer: B
A. Brute force
B. Replay attack
C. Session hijacking
D. Phishing
Answer: C
A. Discretionary Access Control (DAC)
B. Mandatory Access Control (MAC)
C. Role-Based Access Control (RBAC)
D. Attribute-Based Access Control (ABAC)
Answer: A
A. Encrypt files
B. Enforce secure password creation/management
C. Monitor login attempts
D. Limit account creation
Answer: B
A. Password
B. Smart card
C. Biometrics
D. PIN
Answer: B
A. Loss of password integrity
B. Violation of encryption standards
C. Increased bandwidth usage
D. Unauthorized access
Answer: D
A. Block malicious traffic
B. Prevent brute force attacks
C. Encrypt sensitive data
D. Monitor login attempts
Answer: B
A. Attribute-Based Access Control (ABAC)
B. Role-Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)
Answer: A
A. Enhance encryption
B. Verify physical characteristics
C. Monitor network traffic
D. Backup critical data
Answer: B
A. Privilege escalation
B. Time-bound access
C. User provisioning
D. Conditional access
Answer: B
A. Malware
B. Social engineering
C. Phishing
D. Keylogging
Answer: B
A. Multi-factor authentication
B. Password history policies
C. Single sign-on
D. Encryption
Answer: B
A. Block unauthorized users
B. Record access attempts
C. Update user roles
D. Enforce encryption
Answer: B
A. Detect malware
B. Filter traffic between networks
C. Encrypt sensitive information
D. Manage bandwidth
Answer: B
A. Man-in-the-middle
B. Phishing
C. Denial of Service (DoS)
D. Replay
Answer: C