Computer Science > EXAM > ITF Module 5 Review Test - Questions and Answers (All)
ITF Module 5 Review Test - Questions and Answers Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content ... on the page. Should you proceed? No-this is a classic phishing attack and your friend's computer could be infected with a virus or Trojan. Check whether they sent the link in good faith first True or false? An OEM site is a reputable source of management software and drivers for a particular system. True—an Original Equipment Manufacturer (OEM) in the IT industry, such as Dell or HP, assembles systems made from the parts and software of various other suppliers. The components used in their systems may be specific to their brand and so they host their own support files for any system they sell. What are the four processes of an access control system? Identification, Authentication, Authorization, and Accounting. Users should only be granted the minimum sufficient permissions. What system policy ensures that users do not receive rights unless granted explicitly? Implicit deny What is the main type of non-discretionary access control? Mandatory Access Control—though any rules-based system might restrict discretionary aspects of granting rights. What type of control prevents a user from denying they performed an action? Non-repudiation. Examples of controls providing non-repudiation include logging, video surveillance, biometrics, signatures, and receipts/tokens. What sort of account allows someone to access a computer without providing a user name or password? Guest account. How does a one-time password work? The password is generated by an asymmetric encryption algorithm. This means that the authenticating server can determine that the number was generated by a particular device (fob) at a particular time. When used with a PIN, it also proves that the password was input by a particular user. What type of system allows a user to authenticate once to access multiple services? Single Sign-On (SSO). What type of cryptographic operation(s) are non-reversible? [Show More]
Last updated: 1 year ago
Preview 1 out of 4 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
ITF MODULE 1 - 5 REVIEW TESTS BUNDLE
By Nurse Henny 1 year ago
$30
5
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Feb 14, 2024
Number of pages
4
Written in
All
This document has been written for:
Uploaded
Feb 14, 2024
Downloads
0
Views
45
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·