100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

DCOM 258 lesson 8 Study Guide Exam Questions 2024.

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
05-05-2024
Written in
2023/2024

DCOM 258 lesson 8 Study Guide Exam Questions 2024. test - correct answer test Consider the challenges with providing privileged management and authorization on an enterprise network. Which of the following would the network system administrator NOT be concerned with when configuring directory services? - correct answer Non-repudiation An employee has arrived to work and logged into the network with their smart card. This employee now has access to the company databases, email, and shared network resources. Evaluate all of the basic authorization policies and determine the policy best illustrated in this scenario. - correct answer Single Sign-On (SSO) Compare all of the functions within directory services and determine which statement accurately reflects the function of group memberships. - correct answer The key provided at authentication lists a user's group memberships, which in turn allows certain access to resources on the network. What are the most common, baseline account policies system administrators implement on a secure domain network? (Select all that apply.) - correct answer Use upper- and lower-case letters, numbers, and special characters for passwords/ Set a lockout duration period of one hour. Windows has several service account types, typically used to run processes and background services. Which of the following statements about service accounts is FALSE? - correct answer The local service account creates the host processes and starts Windows before the user logs on. A network administrator regularly reviews group membership and access control lists for each resource. The administrator also looks for unnecessary accounts to disable. What is the administrator executing in this situation? - correct answer Permission auditing A system administrator has configured a security log to record unexpected behavior and review the logs for suspicious activity. Consider various types of audits to determine which type aligns with this activity. - correct answer Usage auditing

Show more Read less
Institution
DCOM
Course
DCOM








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
DCOM
Course
DCOM

Document information

Uploaded on
May 5, 2024
Number of pages
3
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • dcom

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ROSEGRADES Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
224
Member since
2 year
Number of followers
87
Documents
12133
Last sold
3 days ago
TOPGRADE

I HELP STUDENTS WITH REVISION MATERIALS WITH BETTER GRADES GUARANTEED. BEST OF LUCK.

3.5

34 reviews

5
12
4
4
3
11
2
2
1
5

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions