Sy0-501 Security + Practice Test

Wyjście

Pytanie 1 of 1

  Pozostały Czas


0 [{"id":417262,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"An access control model in which every resource has a sensitivity label matching clearance level assigned to a user is called ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":36,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417264,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"An auditor suspects someone in the organization is accessing confidential information after working hours when no one else is around. Which of the following actions can help prevent this specific threat?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":39,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417256,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A systems administrator is implementing a security baseline template on a newly installed server. Which of the following is a benefit of implementing the baseline? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":30,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417269,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following can be provided to an AAA system for the identification phase? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":43,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417268,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-05-09 13:37:11","questionName":"A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from his server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from occurring? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":37,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417257,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A systems administrator wants to protect data stored on mobile devices that are used to scan and record assets in a warehouse. The control must automatically destroy the secure container of mobile devices if they leave the warehouse. Which of the following should the administrator implement?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":31,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417263,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"A type of access control in computer security where every object has an owner who at his\/her own discretion determines what kind of permissions other users can have to that object is known as","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":41,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417260,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"An MS Windows account that enables users to have temporary access to a computer without the capability to install software or hardware, change settings, or create a user password is calle","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":34,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417265,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-05-09 13:37:11","questionName":"An employee is being terminated from a company. Which of the following steps is MOST important in the process of disengagement from this employee?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":40,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417259,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Which of the following answers refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":33,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417270,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-04-12 16:02:50","questionName":"A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Select TWO). ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":44,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417258,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS attack. An investigation discovers a certain type of refrigerator was exploited and used to send outbound packets to the website that crashed. To which of the following categories does the refrigerator belong? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":32,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417267,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-05-09 13:37:11","questionName":"The domain administrator account is an example of which kind of account? ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":38,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417261,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:51","updated_at":"2018-04-12 16:02:50","questionName":"Solutions providing the AAA functionality include (Select TWO)","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":35,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":417266,"quiz_id":"21123","answer_id":null,"answerType_id":"0","created_at":"2018-03-27 13:00:52","updated_at":"2018-05-09 13:37:11","questionName":"Users continually set weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Select TWO). ","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":42,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
417262
0
60
block

An access control model in which every resource has a sensitivity label matching clearance level assigned to a user is called

Wybierz prawidłowe odpowiedzi  

(0/0)












417264
0
60
none
417256
0
60
none
417269
0
60
none
417268
0
60
none
417257
0
60
none
417263
0
60
none
417260
0
60
none
417265
0
60
none
417259
0
60
none
417270
0
60
none
417258
0
60
none
417267
0
60
none
417261
0
60
none
417266
0
60
none