Which security mechanism uses a unique list that meets the following specifications quizlet?

Resources, policies, and systems.

Data, applications, systems, networks, and physical space.

Users, applications, or processes that need to be given access.

Policies, procedures, and technologies that are implemented within a system.

PIN
Something You Know

Smart card
Something You Have

Password
Something You Know

Retina scan
Something You Are

Fingerprint scan
Something You Are

Hardware token
Something You Have

Passphrase
Something You Know

Voice recognition
Something You Are

Wi-Fi triangulation
Somewhere You Are

Typing behaviors
Something You Do

A password, a biometric scan, and a token device

A password, a biometric scan, and a token device together are the strongest form of multi-factor authentication listed here. Multifactor authentication is any combination of two or more of the same or different authentication factors. The three common authentication factor types are Something You Know (such as a password), Something You Have (such as a smart card or a token device), and Something You Are (such as a biometric quality, like a fingerprint).

The other three options are all weaker forms of multi-factor authentication. A password and a biometric scan is a multi-factor authentication system, but it is also an example of two-factor authentication. Two-factor authentication is any combination of two or more different authentication factors. Two passwords is an example of multi-factor authentication, but since it uses two of the same type of factors, it is not a true two-factor authentication method.

Data, applications, systems, networks, and physical space.

Objects are entities that represent data, applications, systems, networks, and physical space.
Subjects are the users, applications, or processes that need access to objects. The access control system includes the policies, procedures, and technologies that are implemented to control a subject's access to an object.

How do you want to study today?

  • Review terms and definitions

  • Focus your studying with a path

  • Get faster at matching terms

Group Policy Objects (GPOs) are applied in which of the following orders?
GPO linked to site, GPO linked to domain, GPO linked to organizational unit (highest to lowest), Local Group Policy.
Local Group Policy, GPO linked to site, GPO linked to domain, GPO linked to organizational unit (lowest to highest).
Local Group Policy, GPO linked to site, GPO linked to domain, GPO linked to organizational unit (highest to lowest).
GPO linked to site, GPO linked to domain, GPO linked to organizational unit (lowest to highest), Local Group Policy.

Other sets by this creator

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only SGD 41.99/year

How do you want to study today?

  • Flashcards

    Review terms and definitions

  • Learn

    Focus your studying with a path

  • Test

    Take a practice test

  • Match

    Get faster at matching terms

Terms in this set (4)

Which of the following info is typically not included in an access token?

A. Group Membership
B. User rights
C. User security identifier
D. User account password

D. User account password

Access token does not contain the user account password. Password is only used during authentication. Following authentication, then access token is used to gain access to resources. When security principal logs on, an access token contains:
-SID for user/computer
-SID for all groups the user/computer is member of
-User rights granted to security principal

Marcus White has just been promoted to a manager. To give him access to the file he needs, you make his user account a member of the managers group which has access to a special shared folder. Later, Marcus tells you he is still unable to access the files for that group. What should you do?

A. Manually refrtesh group policy settings
B. Have him log off and back on
C. Add his user account to ACL for shared folder
D. Manually refresh group policy settings on file server

B. Have him log off and back on

Access token generated per authentication. Changes made to group memberships/user rights do not take effect until the user logs on again and a new access token is created.

Which of the following terms describes the component that is generated following authentication and which is used top gain access to resources following logon?

A. Account policy
B. Cookie
C. Proxy
D. Access token

D. Access token

Access token is generated when a security principal logs on.

Which security mechanism uses a unique list for each object embedded directly in the object itself that defines which subjects have access to certain objects and the level or type of access allowed?

A. Mandatory access control
B. User ACL
C. Kerberos
D. Hashing

B. User ACL

User ACL is a security mechanism that defines which subjects have access to certain objects and the level/type of access allowed. This security mechanism is unique for each object and is embedded directly in the object itself.

Sets found in the same folder

Testout LabSim Security Pro, 2.5 Exam

2 terms

lichmistress

TestOut Security Pro // CompTIA Security+

240 terms

cyberwarrior69

TestOut Quiz 2.4

12 terms

Mary_McEntee

Mid1 Chap3 M82

83 terms

Mac_Cortez

Other Quizlet sets

ATP synthesis (synthase)

13 terms

berls44

W TASK 1 THƯ HỎI THÔNG TIN

11 terms

quizlette7780510

third psych test

41 terms

mgpowell2204

CH 16 and 17 quiz questions

21 terms

Sophia_Delgado12

Related questions

QUESTION

The Catskill delta clastic wedge is associated with weathering and erosion of highlands resulting from which orogeny?

12 answers

QUESTION

Carbon dating uses the isotope of carbon known as

13 answers

QUESTION

How does Huck explain Jim to the duke and the king?

15 answers

QUESTION

In a competitive price taker market, a firm's short-run supply curve is its

9 answers