1. Your supervisor is checking out what you are doing at work. You are asked to verify...
Question:
1. Your supervisor is checking out what you are doing at work. You are asked to verify log files that identify what files you accessed, when you accessed the files, and from what device. Which choice below BEST describes this?
A. permission auditing and review
B. impossible travel time
C. usage auditing and review
D. disablement
2. What is a system that creates, maintains, and manages identity information and also provides authentication services?
A. User accounts
B. Identity provider (IdP)
C. SSH keys
D. Service accounts
3. A part-time, temporary worker will be performing some database maintenance at your organization for 90 days. This person needs an account to access the organization’s data. From a security perspective, what is the BEST action to take when creating this account?
A. configure an expiration date on the account 90 days from now
B. configure a minimum password age of 90
C. configure a maximum password age of 90
D. configure a password history of 90
4. Your supervisor is asking you to identify your privileges. You are also being asked if these privileges are still necessary. Which choice below BEST describes this?
A. disablement
B. permission auditing and review
C. impossible travel time
D. usage auditing and review
5. What settings do we use to prevent users from rotating through passwords, so they can use a previous password?
A. minimum password age and maximum password age
B. password history and maximum password age
C. account lockout threshold and account lockout duration
D. password history and minimum password age
6. What type of account has limited access for a limited time for people who are in an organization on a temporary basis?
A. shared and generic accounts
B. a guest account
C. user account
D. service account
7. Due to COVID-19 restrictions and safety reasons, you have been working at home on a regular schedule 9am-5pm from Monday to Friday. After the restrictions have been lifted, you meet several of your Oahu coworkers in the evening at Starbucks to collaborate face-to-face; however, you and your coworkers are unable to connect to the company’s network. What is the MOST likely reason that y’all cannot access the company’s network?
A. account disablement
B. account audits
C. impossible travel time
D. time-of-day restrictions
8. What type of account is used by applications and services?
A. a guest account
B. shared and generic accounts
C. service account
D. user account
9. For accounting purposes, you want to make sure that the system log entries are correctly recording the identity of employees, when they access data and resources on the system. Which of the following actions BEST enforces this policy?
A. removing all user accounts
B. automatically recovering a password with secret questions
C. removing all shared and generic accounts
D. enforcing time-of-day restrictions on accounts
10. From a security perspective, what should be done with an employee's account when the employee leaves an organization?
A. lockout the account
B. convert the account to a guest account
C. disable the account
D. reset the account's password