Resources, policies, and systems.
Data, applications, systems, networks, and physical space.
Users, applications, or processes that need to be given access.
Policies, procedures, and technologies that are implemented within a system.
PIN
Something You Know
Smart card
Something You Have
Password
Something You Know
Retina scan
Something You Are
Fingerprint scan
Something You Are
Hardware token
Something You Have
Passphrase
Something You Know
Voice recognition
Something You Are
Wi-Fi triangulation
Somewhere You Are
Typing behaviors
Something You Do
A password, a biometric scan, and a token device
A password, a biometric scan, and a token device together are the strongest form of multi-factor authentication listed here. Multifactor authentication is any combination of two or more of the same or different authentication factors. The three common authentication factor types are Something You Know (such as a password), Something You Have (such as a smart card or a token device), and Something You Are (such as a biometric quality, like a fingerprint).
The other three options are all weaker forms of multi-factor authentication. A password and a biometric scan is a multi-factor authentication system, but it is also an example of two-factor authentication. Two-factor authentication is any combination of two or more different authentication factors. Two passwords is an example of multi-factor authentication, but since it uses two of the same type of factors, it is not a true two-factor authentication method.
Data, applications, systems, networks, and physical space.
Objects are entities that represent data, applications, systems, networks, and physical space.
Subjects are the users, applications, or processes that need access to objects. The access control system includes the policies, procedures, and technologies that are implemented to control a subject's access to an object.
Review terms and
definitions Focus your studying with a path Get faster at matching termsHow do you want to study today?
Group Policy Objects (GPOs) are
applied in which of the following orders?
GPO linked to site, GPO linked to domain, GPO linked to organizational unit (highest to lowest), Local Group Policy.
Local Group Policy, GPO linked to site, GPO linked to domain, GPO linked to organizational unit (lowest to highest).
Local Group Policy, GPO linked to site, GPO linked to domain, GPO linked to organizational unit (highest to lowest).
GPO linked to site, GPO linked to domain, GPO linked to organizational unit (lowest to
highest), Local Group Policy.
Home
Subjects
Solutions
Create
Log in
Sign up
Upgrade to remove ads
Only SGD 41.99/year
Review terms and definitions
Focus your studying with a path
Take a practice test
Get faster at matching termsHow do you want to study today?
Flashcards
Learn
Test
Match
Terms in this set (4)
Which of the following info is typically not included in an access token?
A. Group Membership
B. User rights
C. User security identifier
D. User account password
D. User account password
Access token does not
contain the user account password. Password is only used during authentication. Following authentication, then access token is used to gain access to resources. When security principal logs on, an access token contains:
-SID for user/computer
-SID for all groups the user/computer is member of
-User rights granted to security principal
Marcus White has just been promoted to a manager. To give him access to the file he needs, you make his user account a member of the managers group which has access to a special shared folder. Later, Marcus tells you he is still unable to access the files for that group. What should you do?
A. Manually refrtesh group policy settings
B. Have him log off and back on
C. Add his user account to ACL for shared folder
D. Manually refresh group policy settings on file server
B. Have him log off and back on
Access token generated per authentication. Changes made to group memberships/user rights do not take effect until the user logs on again and a new access token is created.
Which of the following terms describes the component that is generated following authentication and which is used top gain access to resources following logon?
A. Account policy
B. Cookie
C. Proxy
D. Access token
D. Access token
Access token is generated when a security principal logs on.
Which security mechanism uses a unique list for each object embedded directly in the object itself that defines which subjects have access to certain objects and the level or type of access allowed?
A. Mandatory access control
B. User ACL
C. Kerberos
D. Hashing
B. User ACL
User ACL is a security mechanism that defines which subjects have access to certain objects and the level/type of access allowed. This security mechanism is unique for each object and is embedded directly in the object itself.
Sets found in the same folderTestout LabSim Security Pro, 2.5 Exam
2 terms
lichmistress
TestOut Security Pro // CompTIA Security+
240 terms
cyberwarrior69
TestOut Quiz 2.4
12 terms
Mary_McEntee
Mid1 Chap3 M82
83 terms
Mac_Cortez
Other Quizlet setsATP synthesis (synthase)
13 terms
berls44
W TASK 1 THƯ HỎI THÔNG TIN
11 terms
quizlette7780510
third psych test
41 terms
mgpowell2204
CH 16 and 17 quiz questions
21 terms
Sophia_Delgado12
Related questionsQUESTION
The Catskill delta clastic wedge is associated with weathering and erosion of highlands resulting from which orogeny?
12 answers
QUESTION
Carbon dating uses the isotope of carbon known as
13 answers
QUESTION
How does Huck explain Jim to the duke and the king?
15 answers
QUESTION
In a competitive price taker market, a firm's short-run supply curve is its
9 answers