CHAPTER SUMMARY

In this chapter, you learned that understanding the significance of information within an enterprise helps an administrator grant proper access to those working within the infrastructure. Limiting access reduces risk for an enterprise and assists in ensuring data does not get into the wrong hands. Limiting access can also be a hindrance to employees; therefore, planning is essential before implementing controls.

Access to systems and data should be granted only after a user is authenticated. Types of authentication, their benefits, and their risks are factors in the planning process to keep employees, customers, and data safe.

KEY CONCEPTS AND TERMS

CHAPTER 5 ASSESSMENT

  1. What does ACL stand for?
    1. Access control level
    2. Access control limit
    3. Access control logic
    4. Access control list
  2. List the four types of access control models.
  3. Which of the following are components of a Kerberos system? (Select two.)
    1. TKIP
    2. AS
    3. TGS
    4. BGP
  4. A switch is a device used on which layer of the OSI model?
    1. Layer 1
    2. Layer 2
    3. Layer 4
    4. Layer 5
  5. Which of the following are authentication factors? (Select three.)
    1. Something you need
    2. Something you have
    3. Something you are
    4. Something you believe
    5. Something you know
  6. VLANs are used to segment networks.
    1. True
    2. False
  7. Which are types of access control lists? (Select two.)
    1. DACL
    2. MACL
    3. SACL
    4. TACL
  8. Of the following, what is the most recent wireless security standard?
    1. WPA
    2. WPA2
    3. WPA3
    4. WEP
  9. Which of the following is the most secure encryption method for WLANs?
    1. DAC
    2. WEP
    3. WPA
    4. MAC
  10. How many hexadecimal digits are provided by IEEE for vendor identification?
    1. 6
    2. 12
    3. 18
    4. 24
  11. Which IEEE standard defines WLANs?
    1. 802.11
    2. 802.10
    3. 802.5
    4. 802.1q
  12. Which of the following is an example of SSO?
    1. Keystroke logger
    2. Trojan horse
    3. Kerberos
    4. Broadcast domains
  13. Which of the following is an access control system in which rights are assigned by the owner of the resource?
    1. Discretionary access control
    2. Mandatory access control
    3. Role-based access control
    4. Media access control
  14. Which of the following is an access control system in which rights are assigned based on a user’s role rather than his or her identity?
    1. Discretionary access control
    2. Mandatory access control
    3. Role-based access control
    4. Media access control
  15. Which of the following is an access control system in which rights are assigned by the system itself?
    1. Discretionary access control
    2. Mandatory access control
    3. Role-based access control
    4. Media access control
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.251.72