Question: Question 6 (1 point) Using network access control strategies access to files, folders and other resources is based on the job roles each user has

Question 6 (1 point)

Using network access control strategies access to files, folders and other resources is based on the job roles each user has within the organization.

A. DAC

B.STAC

C. RBAC

D. MAC

Question 7 (1 point)

Using network access control strategies the user is given the ability to decide who has access to their files, folders and other resources, as well as to what extent.

Question 7 options:

A. MAC

B. STAC

C. DAC

D. RBAC

Question 8 (1 point)

What function is the SNMP protocol designed to perform?

Question 8 options:

A. To handle outgoing email for the network

B. To provide extended server management functions separate from the main network operating system

C. To provide remote access capabilities for the network administrator

D. To provide remote monitoring functions for the network administrator

Question 9 (1 point)

Administrators typically use to collectively deal with user accounts that have common needs.

Question 9 options:

A. Access rights

B. Inherited access

C. Group accounts

D. Permissions

Question 10 (1 point)

What is the first step to take when hardening a servers operating system after it has been installed and configured for operation?

Question 10 options:

A. Close any open TCP/UDP network ports

B. Configure Admin and user authentication systems

C. Remove or stop any unnecessary services, applications and protocols

D. Map the servers network topology to determine what devices are attached to it

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!