Which security mechanism uses a unique list that meets the following specifications:
e The list is embedded directly in the object itself.
The list defines which subjects have access to certain objects.
The list specifies the level or type of access allowed to certain objects.
> () UserACL
() Conditional access
@® Mandatory access control
() Hashing
6
What is the process of controlling access to resources such as computers, files, or printers called?
() Conditional access
—> () Authorization
Mandatory access control
@ Authentication
Cunlamasina
bo
Which of the following objects identifies a set of users with similar access needs?
> @® Group
O DACL
() Permissions
(O SACL
, Which of the following identifies the type of access that is allowed or denied for an object?
User rights
SACL
Permissions
DACL
Which of the following is used by Microsoft for auditing in order to identify past actions performed by users on an object?
@® DACL
(O Userrights
SACL
N
Permissions
Which type of group can be used for controlling access to objects?
> @ Security
() DACL
() Authorization
() Distribution
bo
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers
group, which has access to a special shared folder.
Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group.
What should you do?
() Manually refresh Group Policy settings on the file server.
() Manually refresh Group Policy settings on his computer.
() Add his user account to the ACL for the shared folder.
> @ Have Marcus log off and log back in.
Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?
Cookie
Account policy
Access token
Proxy