Show Recommended textbook solutionsSocial Psychology10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson 525 solutions
Operations Management: Sustainability and Supply Chain Management12th EditionBarry Render, Chuck Munson, Jay Heizer 1,698 solutions
Human Resource Management15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine 249 solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions Active Directory Explanation: A directory service stores, organizes, and provides access to information in a directory. It is used for locating, managing, and administering common items and network resources, such as volumes, folders, files, printers, users, groups, devices, telephone numbers, and other objects. One popular directory service used by many organizations is Microsoft's Active Directory. Which of the following scenarios describes a transitive trust situation? A. Company A trusts the authentication systems of Company B, and vice versa. B. Company A trusts the authentication systems of Company B, but Company B does not trust Company A's authentication systems. C. Company A trusts the authentication systems of Company B, and Company B trusts the systems of Company C, so Company A trusts Company C. D. Company A trusts the authentication systems of Company B and Company C, both explicitly. Upgrade to remove ads Only ₩37,125/year
Terms in this set (79)Encryption Which of the following is not a method for authentication? Password reader Which of the
following is not a biometric device? RADIUS Which of the following services is used for centralized authentication, authorization, and accounting? Kerberos What is the primary authentication method used on Microsoft Active Directory? PDC Emulator The master time keeper and master for password changes in an Active Directory domain is: SAM Local user accounts are found in: right A(n) _____ authorizes a user to perform certain actions on a computer. NTFS Which of the following file systems offers the best security? Full Control Which NTFS permission is needed to change attributes and permissions? Explicit Which type of permission is granted directly to a file or folder? The same permissions as the target folder If you copy a file or folder to a new volume, what permissions will that file or folder have? NTFS folder Which of the following uses an ACL? Asymmetric Which type of key has one key for encryption and a different key for decryption? PKI Which infrastructure is used to assign and validate digital certificates? EFS Which technology is used to encrypt an individual file on an NTFS volume? security token A device that may give you a second password to log in to a system is a(n) _____. domain controller The _____ holds a copy of the centralized database used in Active Directory five By default, your computer clock should not be off more than ____ minutes or you might have problems with Kerberos authentication. permission A(n) _____ defines the type of access over an object or the properties of an object such as an NTFS file or printer. Inherited _____ permissions flow from a parent object to a child object.
ownership When you cannot access a folder because someone removed the permissions so that no one can access it, you must take _____ of the folder. registry The centralized database that holds most of the Windows configuration is known as the _____. auditing To track a user's activities in Windows, you need to enable _____. access control list (ACL) A list of all users and groups that have access to an object. accounting Also known as auditing, is the process of keeping track of a user's activity while accessing network resources, including the amount of time spent in the network, the services accessed while there, and the amount of data transferred during each session. Active Directory A directory service technology created by Microsoft that provides a variety of network services, including Lightweight Directory Access Protocol (LDAP), Kerberos-based and single sign-on (SSO) authentication, DNS-based naming and other network information and a central location for network administration and delegation of authority. administrative share A shared folder typically used for administrative purposes. asymmetric encryption Also known as public key cryptography, uses two mathematically related keys for encryption. One key is used to encrypt the data, while the second is used to decrypt it. auditing Also known as accounting, is the process of keeping track of a user's activity while accessing network resources, including the amount of time spent in the network, the services accessed while there, and the amount of data transferred during each session. authentication The process of identifying an individual, usually based on a username and a password.
authorization The process of giving individuals access to system objects based on their identity. biometrics An authentication method that identifies and recognizes people based on physical traits, such as fingerprints, face recognition, iris recognition, retinal scans, and voice recognition. BitLocker To Go A new feature in Windows 7 that enables users to encrypt removable USB devices, such as flash drives and external hard disks. brute force attack A type of attack that tries as many possible combinations of characters as time and money permits. built-in groups The default groups that are included within Windows or Active Directory certificate chain Also known as the certification path, is a list of certificates used to authenticate an entity. It begins with the certificate of the entity and ends with the root CA certificate. certificate revocation list (CRL) A list of certificates (or more specifically, a list of serial number for certificates) that have been revoked or are no longer valid and therefore should not be relied on. computer account A logical object that provides a means for authentication and auditing a computer's access to a Windows network, as well as its access to domain resources. decryption The process of converting data from encrypted format back to its original form. dictionary attack A form of attack which attempts all words in one or more dictionaries. Lists of common passwords are also typically tested. digital certificate An electronic document that contains an identity, such as a user or organization name, along with a corresponding public key. Because a _____ is used to prove a person's identity, it can also be used for authentication. digital signature A mathematical scheme that is used to demonstrate the authenticity of a digital message or document. It is also used to prove that the message or document has not been modified. domain controller A Windows server that stores a replica of the account and security information of a domain and defines the domain boundaries. domain user A user account stored on the domain controller and allows you to gain access to resources within the domain, assuming you have been granted permissions to access those objects. effective permission Actual permissions when logging in and accessing a file or folder. They consist of explicit permissions plus any inherited permissions encryption The process of converting data into a format that cannot be read by another user. Once a user has ______ a file, that file automatically remains _____ when it is stored on disk. explicit permission Permissions granted directly to a file or folder group A collection or list of user accounts or computer accounts hash function Has a one-way encryption, which means that after something has been encrypted with this method, it cannot be decrypted. inherited permission
Permissions granted to a folder (parent object or container) that flows into child objects (subfolders or files) inside that folder. IP Security (IPsec) A suite of protocols that provides a mechanism for data integrity, authentication, and privacy for the Internet Protocol. It is used to protect data that is sent between hosts on a network by creating secure electronic tunnels between two machines or devices. ____ can be used for remote access, VPN, server connections, LAN connections, or WAN connections. Kerberos The default domain computer network authentication protocol, which allows hosts to prove their identity over a non-secure network in a secure manner. Key Can be thought of as a password, is applied mathematically to plain text to provide cipher or encrypted text. Different _____ produce different encrypted output. local user account A user account that is stored in the Security Account Manager (SAM) database on the local computer. member server A server that is not running as a domain controller multifactor authentication When two or more authentication methods are used to authenticate someone. nonrepudiation Prevents one party from denying the actions it has carried out. NTFS The preferred file system for today's Windows operating system NTFS Permission Permissions that allow you to control which users and groups can gain access to files and folders on an NTFS volume NTLM The default authentication protocol for Windows NT, stand-alone computers that are not part of a domain, and situations in which you are authenticating to a server using an IP address. organizational units (OU) A container used in Active Directory to help organize objects within a domain and minimize the number of domains owner An identity that controls an object including what permissions are set on the object and to whom permissions are granted. password A secret series of characters that enables a user to access a particular file, computer, or program permission Defines the type of access that is granted to an object (an object can be identified with a security identifier) or object attribute personal identification number (PIN) A secret numeric password shared between a user and a system that can be used to authenticate the user to the system. public key infrastructure (PKI) A system consisting of hardware, software, policies, and procedures that create, manage, distribute, use, store, and revoke digital certificates. Within the ____, the certificate authority (CA) binds a public key with respective user identities and issues digital certificates containing the public key. registry A central, secure database in which Windows stores all hardware configuration information, software configuration information, and system security policies. Components that use the ____ include the Windows kernel, device drivers, setup programs, hardware profiles, and user profiles. right Authorizes a user to perform certain actions on a computer, such as logging on to a system interactively or backing up files and directories on a system. User _____ are assigned through local policies or Active Directory group policies. Secure Sockets Layer (SSL) A cryptographic system that uses two keys to encrypt data, a public key known to everyone and a private key known only to the recipient of the message. The public key is published in a digital certificate, which also confirms the identity of the web server. Security Account Manager (SAM) A local security database found on most Windows computers. security token A physical device that an authorized computer services user is given to ease authentication. share permissions permissions assigned to shared folders or drives shared folder Technology that allows access of data files over the network. single sign-on (SSO) Technology that allows you to log on once and access multiple related but independent software systems without having to log in again. smart card A pocket-sized card with embedded integrated circuits consisting of nonvolatile memory storage components and perhaps dedicated security logic. symmetric encryption Uses a single key to encrypt and decrypt data. Syslog A standard for logging program messages that can be accessed by devices that would not otherwise have a method for communications. user account A logical object that enables a user to log on to a computer and domain. virtual private network (VPN) Technology that links two computers through a wide-area network such as the Internet. To keep the connection secure, the data sent between the two computers is encapsulated and encrypted. Students also viewed98-367 MTA Security Fundamentals Lesson 330 terms kweera66 98-367 MTA Security Fundamentals Lesson 245 terms kweera66 Lesson 227 terms SophiaNosis CHAPTER 02 CYBER REVIEW53 terms caoj01 Sets found in the same folderSecurity Fundamentals 98-367: Lesson 139 terms CDOBambu Security Fundamentals 98-367: Lesson 447 terms CDOBambu Security Fundamentals 98-367: Lesson 548 terms CDOBambu Security Lesson 5 HW27 terms lancaster227 Other sets by this creatorChapter 1, Key Terms9 terms CDOBambu SY0-401 Ports31 terms CDOBambu Security+ SYO-401 Term 2015495 terms CDOBambu 70-411 Transcender Random15 terms CDOBambu Verified questions
biology What are the main physical characteristics of each intertidal zone? Verified answer
physics When using a coordinate system, how is the angle or direction of a vector determined with respect to the axes of the coordinate system? Verified answer
chemistry Using Mulliken's formula, calculate a value for the electronegativity of oxygen. Convert the result to a value on Pauling's scalc. Sce Problem 9.149. Verified answer
chemistry $\mathrm{C}_3 \mathrm{H}_8$ or $\left(\mathrm{CH}_3\right)_2 \mathrm{O}$ Verified answer Recommended textbook solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 726 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Other Quizlet setsSRA Lectures for Exam II Worksheet 621 terms SaundersState Router Config Test #1 (Mr. Miller)25 terms andrew_johnson713 ICND1 100-105 Unit 645 terms Cyanna-EducationTeacher A+ 1001 part 2 (In progress)370 terms Theamanjadon What methods can be used to implement location based authentication?What methods can be used to implement location-based authentication? You can query the location service running on a device, which may be using GPS or Wi-Fi to triangulate its position, and you can use a geolocation by IP database.
What authentication factor is based on the location of the user?Location factors
Geolocation security can be used to ensure that only users within a specific geographic area can gain access to the system.
What are 3 ways to authenticate a user?There are three common factors used for authentication:. Something you know (such as a password). Something you have (such as a smart card). Something you are (such as a fingerprint or other biometric method). What are the 4 types of authentication?5 Common Authentication Types. Password-based authentication. Passwords are the most common methods of authentication. ... . Multi-factor authentication. ... . Certificate-based authentication. ... . Biometric authentication. ... . Token-based authentication.. |