Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Saint Leo University COM 520 Chapter 3 1)Which of the following best describes the principle of least privilege? A

Saint Leo University COM 520 Chapter 3 1)Which of the following best describes the principle of least privilege? A

Computer Science

Saint Leo University

COM 520

Chapter 3

1)Which of the following best describes the principle of least privilege?

A.            Providing the necessary access to carry out any task

B.            Providing access to the least number of objects possible

C.            Providing just the necessary access required to carry out a task

D.            Providing access equivalent to the least populated security group

2.            Which type of user account is designed using the principle of least privilege?

A.            LUA

B.            SID

C.            GUID

D.            KDC

 

3.            What structure does the Windows operating system use to store collections of permissions for objects?

A.            ACE

B.            DACL

C.            GUID

D.            CLSID

4.            If a regular user is a member of four groups, how many Sills will be stored in the user's SAT?

A.            1

B.            4

c. s

D. 6

 

5.            Which of the following best describes UAC?

A.            Prompts users before escalating to administrator privileges

B.            Prevents processes from escalating to administrator privileges

C.            Terminates programs that attempt to escalate to administrator privileges

D.            Alerts users that attempts to escalate to administrator privileges have been automatically denied

6.            Which protocol does the Windows operating system use by default to authenticate computers to exchange security information?

A.            Kerberos

B.            NTIM

 

C.            SAML

D.            TCP/IP

7.            When viewing an object's DACL, which permission indicates that advanced permissions have been set?

A.            Extended permissions

B.            Advanced permissions

C.            Special permissions

D.            Level II permissions

8.            Which type of identifier was originally developed to identify ActiveX controls?

A.            SID

B.            PID

C.            CLSID

D.            GUID

9.            Which type of identifier is used to identify user groups?

A.            SID

B.            PID

 

C.            CLSID

D.            GUID

10.          If a user, userA, is a member of groupA and groupB, and groupB allows read access to helloWorld.c but groupA denies read access to helloWorld.c, can userA read helloWorld.c?

A.            Yes. because groupA allows read access to helloWorld.c.

 

B.              No, because groupB denies read access to helloWorld.c.

C.            Yes, because userA is a member of groupB.

D.            No, because users cannot belong to multiple groups.

11.          Why should you carefully design an auditing strategy before turning auditing on?

A.            Auditing incomplete information wastes analysis time.

B.            Auditing too much information causes excessive overhead.

 

C.            Ad-hoc auditing rarely provides useful information.

D.            Audit log files only retain limited information without extensive configuration.

12.          Which of the following guidelines tends to provide the most useful auditing information?

A.            Always audit event success and failures.

B.            Never audit both event successes and failures.

C.            Generally audit event failures.

D.            Do not audit event failures unless you first audit event successes.

13.          What tool is most commonly used to view and search audit logs?

A.            Windows Event Viewer

B.            Windows Log Viewer

C.            Windows Audit Viewer

D.            Windows ACL Viewer

14.          Which of the following Windows tools replaces previous legacy tools and allows ACL modifications?

A.            cads

B.            xcacls

C.            icalcs

D.            robocopy

15.          When using AGULP. for which entity type are local object permissions defined?

A.            User accounts

B.            Global groups

C.            Universal groups

D.            Domain local groups

 

 

 

 

 

 

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE