Resources, policies, and systems. Data, applications, systems, networks, and physical space. Users, applications, or processes that need to be given access. Policies, procedures, and technologies that are implemented within a system. PIN Smart card Password Retina scan Fingerprint scan Hardware token Passphrase Voice recognition Wi-Fi triangulation Typing behaviors A password, a biometric scan, and a token device A password, a biometric scan, and a token device together are the strongest form of multi-factor authentication listed here. Multifactor authentication is any combination of two or more of the same or different authentication factors. The three common authentication factor types are Something You Know (such as a password), Something You Have (such as a smart card or a token device), and Something You Are (such as a biometric quality, like a fingerprint). The other three options are all weaker forms of multi-factor authentication. A password and a biometric scan is a multi-factor authentication system, but it is also an example of two-factor authentication. Two-factor authentication is any combination of two or more different authentication factors. Two passwords is an example of multi-factor authentication, but since it uses two of the same type of factors, it is not a true two-factor authentication method. Data, applications, systems, networks, and physical space. Objects are entities that represent data, applications, systems, networks, and physical space. Review terms and
definitions Focus your studying with a path Get faster at matching terms Group Policy Objects (GPOs) are
applied in which of the following orders? Other sets by this creator
Home Subjects Solutions Create Log in Sign up Upgrade to remove ads Only SGD 41.99/year
Review terms and definitions
Focus your studying with a path
Take a practice test
Get faster at matching terms Terms in this set (4)Which of the following info is typically not included in an access token? A. Group Membership D. User account password Access token does not
contain the user account password. Password is only used during authentication. Following authentication, then access token is used to gain access to resources. When security principal logs on, an access token contains: Marcus White has just been promoted to a manager. To give him access to the file he needs, you make his user account a member of the managers group which has access to a special shared folder. Later, Marcus tells you he is still unable to access the files for that group. What should you do? A. Manually refrtesh group policy settings B. Have him log off and back on Access token generated per authentication. Changes made to group memberships/user rights do not take effect until the user logs on again and a new access token is created. Which of the following terms describes the component that is generated following authentication and which is used top gain access to resources following logon? A. Account policy D. Access token Access token is generated when a security principal logs on. Which security mechanism uses a unique list for each object embedded directly in the object itself that defines which subjects have access to certain objects and the level or type of access allowed? A. Mandatory access control B. User ACL User ACL is a security mechanism that defines which subjects have access to certain objects and the level/type of access allowed. This security mechanism is unique for each object and is embedded directly in the object itself. Sets found in the same folderTestout LabSim Security Pro, 2.5 Exam2 terms lichmistress TestOut Security Pro // CompTIA Security+240 terms cyberwarrior69 TestOut Quiz 2.412 terms Mary_McEntee Mid1 Chap3 M8283 terms Mac_Cortez Other Quizlet setsATP synthesis (synthase)13 terms berls44 W TASK 1 THƯ HỎI THÔNG TIN11 terms quizlette7780510 third psych test41 terms mgpowell2204 CH 16 and 17 quiz questions21 terms Sophia_Delgado12 Related questionsQUESTION The Catskill delta clastic wedge is associated with weathering and erosion of highlands resulting from which orogeny? 12 answers QUESTION Carbon dating uses the isotope of carbon known as 13 answers QUESTION How does Huck explain Jim to the duke and the king? 15 answers QUESTION In a competitive price taker market, a firm's short-run supply curve is its 9 answers |