ITSY 1300 CHAPTER 5-8 TEST QUESTIONS &
ANSWERS
Which part of the CIA triad refers to preventing the disclosure of secure information to
unauthorized individuals or systems? - Answer -Confidentiality
Which part of the CIA triad refers to making sure information is obtainable when
needed? - Answer -Availability
Which part of the CIA triad refers to maintaining and assuring the accuracy of data over
its life-cycle? - Answer -Integrity
Which of the following combines something you know (e.g. password) with something
you are (e.g. fingerprint) or something you possess (e.g. USB stick) and can also
employ a certificate system that adds a distinct third layer to the authentication process?
- Answer -Two-factor authentication
Microsoft Windows Active Directory provides capabilities in all three of the CIA areas,
and the domain administrator will be called upon to implement: - Answer -The roles of
Confidentiality and Integrity most frequently
Members of the ____________ group called Remote Desktop Users are allowed to use
the remote desktop services to connect to remote machines. - Answer -Builtin (built-in)
If it is impractical to place guest users in a secure network, isolated from the production
network by firewall barriers, then: - Answer -Specific areas of access should be
determined and they should be as restrictive as possible.
Which of the following statements is true regarding guest users who require a higher
degree of access? - Answer -These guest users can be issued local, self-signed
certificates that expire on a specific date and limit the guest's access.
By default, Windows will: - Answer -Inherit the permissions of the parent folder so that
all subfolders will have the same permissions as the parent.
From the LabFiles Properties dialog box, which of the following options is necessary to
enable you to specify permissions for each subfolder? - Answer -Disable inheritance
On a Windows network share, if the user can add, edit and delete files and folders
within the LabFiles folder, what type of access controls and permissions are probably
configured? - Answer -Modify
, On a Windows network share, if the user can view the folder's contents as well as
execute scripts, what type of access controls and permissions are probably configured?
- Answer -Read and execute
On a Windows network share, if the user can browse a file but cannot copy or modify it,
what type of access controls and permissions are probably configured? - Answer -List
folder contents
Which of the following tools is used to modify permissions on the TargetWindowsDC01
server to allow new users to use the remote desktop services? - Answer -The Group
Policy Object Editor
Windows Group Policy can be used _____________ to control access to many local
computer and network resources such as drives, Internet access, kiosk mode, etc. -
Answer -on either a local or domain level
Which of the following is the mechanism on a Windows server where you can
administer granular policies and permissions on a Windows network using role-based
access? - Answer -Windows Group Policy
Janet is identifying the set of privileges that should be assigned to a new employee in
her organization. Which phase of the access control process is she performing? -
Answer -Authorization
Which of the following would NOT be considered in the scope of organizational
compliance efforts? - Answer -Laws
Biyu is making arrangements to use a third-party service provider for security services.
She wants to document a requirement for timely notification of security breaches. What
type of agreement is most likely to contain formal requirements of this type. - Answer -
Service level agreement (SLA)
By creating users, assigning those users to groups, and then applying groups to
resources in the domain, the administrator sets up both authentication using the Active
Directory Domain authentication policies, and builds a series of nested ___________ to
control the access to domain resources. - Answer -Access Control Lists
Makes the process of accessing machines that are not on the domain much easier. -
Answer -Active Directory
Which of the following is the database that provides a centrally controlled and managed
access and security management system for an organization's Windows computer
systems? - Answer -Active Directory
Which of the following statements is true regarding the rules for password selection? -
Answer -Change your passwords frequently
ANSWERS
Which part of the CIA triad refers to preventing the disclosure of secure information to
unauthorized individuals or systems? - Answer -Confidentiality
Which part of the CIA triad refers to making sure information is obtainable when
needed? - Answer -Availability
Which part of the CIA triad refers to maintaining and assuring the accuracy of data over
its life-cycle? - Answer -Integrity
Which of the following combines something you know (e.g. password) with something
you are (e.g. fingerprint) or something you possess (e.g. USB stick) and can also
employ a certificate system that adds a distinct third layer to the authentication process?
- Answer -Two-factor authentication
Microsoft Windows Active Directory provides capabilities in all three of the CIA areas,
and the domain administrator will be called upon to implement: - Answer -The roles of
Confidentiality and Integrity most frequently
Members of the ____________ group called Remote Desktop Users are allowed to use
the remote desktop services to connect to remote machines. - Answer -Builtin (built-in)
If it is impractical to place guest users in a secure network, isolated from the production
network by firewall barriers, then: - Answer -Specific areas of access should be
determined and they should be as restrictive as possible.
Which of the following statements is true regarding guest users who require a higher
degree of access? - Answer -These guest users can be issued local, self-signed
certificates that expire on a specific date and limit the guest's access.
By default, Windows will: - Answer -Inherit the permissions of the parent folder so that
all subfolders will have the same permissions as the parent.
From the LabFiles Properties dialog box, which of the following options is necessary to
enable you to specify permissions for each subfolder? - Answer -Disable inheritance
On a Windows network share, if the user can add, edit and delete files and folders
within the LabFiles folder, what type of access controls and permissions are probably
configured? - Answer -Modify
, On a Windows network share, if the user can view the folder's contents as well as
execute scripts, what type of access controls and permissions are probably configured?
- Answer -Read and execute
On a Windows network share, if the user can browse a file but cannot copy or modify it,
what type of access controls and permissions are probably configured? - Answer -List
folder contents
Which of the following tools is used to modify permissions on the TargetWindowsDC01
server to allow new users to use the remote desktop services? - Answer -The Group
Policy Object Editor
Windows Group Policy can be used _____________ to control access to many local
computer and network resources such as drives, Internet access, kiosk mode, etc. -
Answer -on either a local or domain level
Which of the following is the mechanism on a Windows server where you can
administer granular policies and permissions on a Windows network using role-based
access? - Answer -Windows Group Policy
Janet is identifying the set of privileges that should be assigned to a new employee in
her organization. Which phase of the access control process is she performing? -
Answer -Authorization
Which of the following would NOT be considered in the scope of organizational
compliance efforts? - Answer -Laws
Biyu is making arrangements to use a third-party service provider for security services.
She wants to document a requirement for timely notification of security breaches. What
type of agreement is most likely to contain formal requirements of this type. - Answer -
Service level agreement (SLA)
By creating users, assigning those users to groups, and then applying groups to
resources in the domain, the administrator sets up both authentication using the Active
Directory Domain authentication policies, and builds a series of nested ___________ to
control the access to domain resources. - Answer -Access Control Lists
Makes the process of accessing machines that are not on the domain much easier. -
Answer -Active Directory
Which of the following is the database that provides a centrally controlled and managed
access and security management system for an organization's Windows computer
systems? - Answer -Active Directory
Which of the following statements is true regarding the rules for password selection? -
Answer -Change your passwords frequently