Why Choose Us?
0% AI Guarantee
Human-written only.
24/7 Support
Anytime, anywhere.
Plagiarism Free
100% Original.
Expert Tutors
Masters & PhDs.
100% Confidential
Your privacy matters.
On-Time Delivery
Never miss a deadline.
Saint Leo University COM 520 Chapter 3 1)Which of the following best describes the principle of least privilege? A
Saint Leo University
COM 520
Chapter 3
1)Which of the following best describes the principle of least privilege?
A. Providing the necessary access to carry out any task
B. Providing access to the least number of objects possible
C. Providing just the necessary access required to carry out a task
D. Providing access equivalent to the least populated security group
2. Which type of user account is designed using the principle of least privilege?
A. LUA
B. SID
C. GUID
D. KDC
3. What structure does the Windows operating system use to store collections of permissions for objects?
A. ACE
B. DACL
C. GUID
D. CLSID
4. If a regular user is a member of four groups, how many Sills will be stored in the user's SAT?
A. 1
B. 4
c. s
D. 6
5. Which of the following best describes UAC?
A. Prompts users before escalating to administrator privileges
B. Prevents processes from escalating to administrator privileges
C. Terminates programs that attempt to escalate to administrator privileges
D. Alerts users that attempts to escalate to administrator privileges have been automatically denied
6. Which protocol does the Windows operating system use by default to authenticate computers to exchange security information?
A. Kerberos
B. NTIM
C. SAML
D. TCP/IP
7. When viewing an object's DACL, which permission indicates that advanced permissions have been set?
A. Extended permissions
B. Advanced permissions
C. Special permissions
D. Level II permissions
8. Which type of identifier was originally developed to identify ActiveX controls?
A. SID
B. PID
C. CLSID
D. GUID
9. Which type of identifier is used to identify user groups?
A. SID
B. PID
C. CLSID
D. GUID
10. If a user, userA, is a member of groupA and groupB, and groupB allows read access to helloWorld.c but groupA denies read access to helloWorld.c, can userA read helloWorld.c?
A. Yes. because groupA allows read access to helloWorld.c.
B. No, because groupB denies read access to helloWorld.c.
C. Yes, because userA is a member of groupB.
D. No, because users cannot belong to multiple groups.
11. Why should you carefully design an auditing strategy before turning auditing on?
A. Auditing incomplete information wastes analysis time.
B. Auditing too much information causes excessive overhead.
C. Ad-hoc auditing rarely provides useful information.
D. Audit log files only retain limited information without extensive configuration.
12. Which of the following guidelines tends to provide the most useful auditing information?
A. Always audit event success and failures.
B. Never audit both event successes and failures.
C. Generally audit event failures.
D. Do not audit event failures unless you first audit event successes.
13. What tool is most commonly used to view and search audit logs?
A. Windows Event Viewer
B. Windows Log Viewer
C. Windows Audit Viewer
D. Windows ACL Viewer
14. Which of the following Windows tools replaces previous legacy tools and allows ACL modifications?
A. cads
B. xcacls
C. icalcs
D. robocopy
15. When using AGULP. for which entity type are local object permissions defined?
A. User accounts
B. Global groups
C. Universal groups
D. Domain local groups
Expert Solution
PFA
Archived Solution
You have full access to this solution. To save a copy with all formatting and attachments, use the button below.
For ready-to-submit work, please order a fresh solution below.





