Which of the following is the process of converting data into a format that Cannot be read by another user?

Cards Return to Set Details

Term
1. What is the process of identifying an individual?a) authenticationb) authorizationc) accounting

d) auditing

Definition
Answer: aDifficulty: EasySection Reference: Starting Security with Authentication

Explanation: In the world of information security, AAA (authentication, authorization, and accounting) is a leading model for access control. Here, authentication is the process of identifying an individual. After a user is authenticated, she can access network resources based on her authorization.

Term
2. What do you call the process in which a user is identified via a username and password?a) authenticationb) authorizationc) accounting

d) auditing

Definition
Answer: aDifficulty: EasySection Reference: Starting Security with Authentication

Explanation: Authentication is the process of identifying an individual, usually based on a username and password. After a user is authenticated, he can access network resources based on his authorization.

Term
3. What is the process of giving individual access to a system or resource?a) authenticationb) authorizationc) accounting

d) auditing

Definition
Answer: bDifficulty: EasySection Reference: Starting Security with Authentication

Explanation: Authorization is the process of giving individuals access to system objects based on their identities. Of course, before authorization is to occur, authentication must occur.

Term
4. What is the process of keeping track of a user’s activity?a) authenticationb) authorizationc) accounting

d) authoring

Definition
Answer: cDifficulty: EasySection Reference: Starting Security with Authentication

Explanation: Accounting, also known as auditing, is the process of keeping track of a user’s activity while accessing network resources, including the amount of time spent in the network, the services accessed while there, and the amount of data transferred during each session.

Term
5. What process prevents someone from denying that she accessed a resource?a) accountingb) authorizationc) sniffing

d) nonrepudiation

Definition
Answer: dDifficulty: EasySection Reference: Starting Security with Authentication

Explanation: Nonrepudiation prevents one party from denying the actions it has carried out. If you have established proper authentication, authorization, and accounting, appropriate mechanisms of nonrepudiation should be in place, and no user should be able to deny the actions she has carried out while in your organization’s system.

Term
6. Which of the following is a secret numeric password used for authentication?a) security tokenb) digital certificatec) digital signature

d) PIN

Definition
Answer: dDifficulty: EasySection Reference: Using a Personal Identification Number (PIN)

Explanation: A personal identification number (PIN) is a secret numeric password shared between a user and a system that can be used to authenticate the user to the system. Because they consist of only digits and are relatively short (usually four digits), PINs are used for relatively low-security scenarios, such as gaining access to a system, or in combination with another method of authentication.

Term
7. What type of electronic document contains a public key?a) digital certificateb) biometricsc) PIN

d) PAN

Definition
Answer: aDifficulty: EasySection Reference: Authentication with What You Own or Possess

Explanation: A digital certificate is an electronic document that contains an identity, such as a user or organization name, along with a corresponding public key. Because a digital certificate is used to prove a person’s identity, it can also be used for authentication.

Term
8. What item, about the size of a credit card, allows access to a network and its resources?a) digital certificateb) smart cardc) security token

d) biometric

Definition
Answer: bDifficulty: EasySection Reference: Authentication with What You Own or Possess

Explanation: A smart card is a pocket-sized card with embedded integrated circuits consisting of nonvolatile memory storage components and perhaps dedicated security logic. Nonvolatile memory is memory that does not forget its content when power is discontinued. This kind of memory may contain digital certificates to prove the identity of the person who is carrying the card, and it may also contain permissions and access information.

Term
9. What type of authentication method identifies and recognizes people based on physical traits such as fingerprints?a) digital certificatesb) WEPc) biometrics

d) RADIUS

Definition
Answer: cDifficulty: EasySection Reference: Authentication with What You Are

Explanation: Biometrics is an authentication method that identifies and recognizes people based on physical traits, such as fingerprints, facial recognition, iris recognition, retinal scans, and voice recognition. Many mobile computers include a finger scanner. Installing biometric devices on doors and cabinets is relatively easy to ensure that only authorized people enter secure areas.

Term
10. What authentication type is the default for Active Directory?a) NTLMb) Kerberosc) MS-CHAP

d) MS-CHAPv2

Definition
Answer: bDifficulty: MediumSection Reference: Introducing Directory Services with Active Directory

Explanation: Kerberos is the default computer network authentication protocol that allows hosts to securely prove their identity over a nonsecure network. It can also provide mutual authentication so that both the user and server verify each other’s identity. To ensure security, Kerberos protocol messages are protected against eavesdropping and replay attacks.

Term
11. What directory service is used with Windows domains?a) Active Directoryb) E-Directoryc) PAM

d) Kerberos

Definition
Answer: aDifficulty: EasySection Reference: Introducing Directory Services with Active Directory

Explanation: A directory service stores, organizes, and provides access to information in a directory. It is used for locating, managing, and administering common items and network resources, such as volumes, folders, files, printers, users, groups, devices, telephone numbers, and other objects. One popular directory service used by many organizations is Microsoft’s Active Directory.

Term
12. What type of server runs Active Directory?a) member serverb) file serverc) domain controller

d) NTLAN server

Definition
Answer: cDifficulty: EasySection Reference: Introducing Directory Services with Active Directory

Explanation: A domain controller is a Windows server that stores a replica of the account and security information of a domain and defines the domain boundaries. To make a computer running Windows Server 2008 a domain controller, you first have to install Active Directory Domain Services. You will then have to execute the dcpromo (short for dc promotion) command to make the server a domain controller from the Search Programs and Files dialog box or from the command prompt.

Term
13. When you access permissions to a folder, you should first grant permissions to __________ rather than users.a) groupsb) computersc) collections

d) organizational units

Definition
Answer: aDifficulty: EasySection Reference: Using Groups

Explanation: A group is a collection or list of user accounts or computer accounts. Different from a container, a group does not store users or computers; rather, it just lists them. Using groups can simplify administration, especially when assigning rights and permissions.

Term
14. When you create a local user on a computer running in Windows 7, where is the user account stored?a) Active Directoryb) SAMc) PAN

d) SQL database

Definition
Answer: bDifficulty: MediumSection Reference: Examining Users

Explanation: A user account allows users to log on and gain access to the computer where the account was created. The local user account is stored in the Security Account Manager (SAM) database on the local computer. The only Windows computer that does not have a SAM database is the domain controller.

Term
15. Which type of group can be granted rights and permissions?a) securityb) distributionc) authorizing

d) SAM

Definition
Answer: aDifficulty: EasySection Reference: Using Groups

Explanation: Windows Active Directory employs two types of groups: security and distribution. A security group is used to assign rights and permissions and to gain access to network resources. It can also be used as a distribution group. A distribution group is used only for nonsecurity functions, such as distributing email, and it cannot be used to assign rights and permissions.

Term
16. What authorizes a user to perform certain actions in Windows such as logging on or performing a backup?a) rightb) permissionc) accessible

d) key

Definition
Answer: aDifficulty: EasySection Reference: Comparing Rights and Permissions

Explanation: A right authorizes a user to perform certain actions on a computer, such as logging on to a system interactively or backing up a system’s files and directories. User rights are assigned through local policies or Active Directory group policies.

Term
17. When you grant access to print to a printer, what are you granting?a) rightb) permissionc) accessible

d) key

Definition
Answer: bDifficulty: EasySection Reference: Comparing Rights and Permissions

Explanation: A permission defines the type of access granted to an object (an object can be identified with a security identifier) or object attribute. The most common objects assigned permissions are printers, NTFS files and folders, and Active Directory objects.

Term
18. Where are users and permissions stored for an NTFS folder?a) access logb) access filec) registry

d) ACL

Definition
Answer: cDifficulty: MediumSection Reference: Comparing Rights and Permissions

Explanation: Information about which users can access an object and what they can do is stored in the access control list (ACL), which lists all users and groups that have access to an object.

Term
19. What type of permissions are assigned directly to a file or folder?a) explicitb) inheritedc) encompassing

d) overriding

Definition
Answer: aDifficulty: EasySection Reference: Looking at Effective NTFS Permissions

Explanation: NTFS uses two types of permissions. Explicit permissions are granted directly to a file or folder, whereas inherited permissions are granted to a parent object and flow down to child objects.

Term
20. What is the process of converting data into a format that cannot be read by another user?a) encryptionb) lockingc) keying

d) registering

Definition
Answer: aDifficulty: EasySection Reference: Using Encryption to Protect Data

Explanation: Encryption is the process of converting data into a format that cannot be read by another user. After a file is encrypted, it automatically remains encrypted when stored on disk. Decryption is the process of converting data from encrypted format back to its original format.

Term
21. Which authentication sends the username and password in plain text?a) MS-CHAPb) CHAPc) PAP

d) SPAP

Definition
Answer: cDifficulty: MediumSection Reference: Encrypting with VPN Technology

Explanation: Password Authentication Protocol (PAP) uses plain text (unencrypted passwords). PAP is the least secure form of authentication and is not recommended.

Term
22. In Windows, what do you use to enable auditing?a) registryb) group policiesc) NTFS permissions

d) access log

Definition
Answer: cDifficulty: MediumSection Reference: Using Auditing to Complete the Picture

Explanation: Auditing is not enabled by default in Windows. To enable auditing, you must specify what types of system events to audit by using group policies or the local security policy (Security Settings\Local Policies\Audit Policy).

Term
23. By default, the ____________ group has full access to all resources within a domain?
Definition
Answer: Domain AdminsDifficulty: MediumSection Reference: Using Built-in Groups

Explanation: Members of the Domain Admins group can perform administrative tasks on any computer within the domain. By default, the Administrator account is a member.

Term
24. _____________ allows you to log on once and access multiple related by different systems without having to log on again.
Definition
Answer: Single sign-on (SSO)Difficulty: MediumSection Reference: Introducing Directory Services with Active Directory

Explanation: Single sign-on (SSO) allows you to log on once and access multiple related but independent software systems without having to log on again. As you log on with Windows via Active Directory, you are assigned a token, which can then be used to log on to other systems automatically.

Term
25. _______________ is the term used to describe two or more authentication methods used to authenticate someone.
Definition
Answer: Multifactor authenticationDifficulty: MediumSection Reference: Starting Security with Authentication

Explanation: When two or more authentication methods are used to authenticate someone, a multifactor authentication system is said to be in place. Of course, a system that uses two authentication methods (such as smart cards and passwords) can be referred to as a two-factor authentication system.

Term
26. ______________ is the standard for logging program messages for UNIX and Linux machines.
Definition
Answer: SyslogDifficulty: HardSection Reference: Using Auditing to Complete the Security Picture

Explanation: If you need to audit non-Microsoft products, you may need to use Syslog, standard for logging program messages that can be accessed by devices that would not otherwise would not have a method for communication. Cisco firewalls and routers, computers running Linux and UNIX, and many printers can use Syslog. It can be employed for computer system management and security auditing, as well as for generalized information, analysis, and debugging messages.

Term
27. What is the most common form of authentication?
Definition
Answer: passwordDifficulty: EasySection Reference: Starting Security with Authentication

Explanation: For both individual computers and entire networks, the most common method of authentication is the password. A password is a secret series of characters that enables a user to access a particular file, computer, or program.

Term
28. You are told that you should not log on to your local computer running Windows 7 as a domain administrator. However, some tools run only as a domain administrator. What should you do?
Definition
Answer: Log on with your normal user account and use RUNAS to run those tools.Difficulty: HardSection Reference: Using Run As

Explanation: Because administrators have full access to individual computers or entire networks, it is recommended that you use a standard non-administrator user account to perform most tasks. Then, when you need to perform administrative tasks, you can use the Run as command or the options built into the Windows operating system.

Supporting users have an ad free experience!

Which of the following is the process of converting data into a format that Cannot be read by another user?

Which of the following is the process of converting data into a format that Cannot be read by another user?

Which of the following is the process of converting data into a format that Cannot be read by another user?