Question: Question 6 (1 point) Using network access control strategies access to files, folders and other resources is based on the job roles each user has
Question 6 (1 point)
Using network access control strategies access to files, folders and other resources is based on the job roles each user has within the organization.
|
| A. DAC |
|
| B.STAC |
|
| C. RBAC |
|
| D. MAC |
Question 7 (1 point)
Using network access control strategies the user is given the ability to decide who has access to their files, folders and other resources, as well as to what extent.
Question 7 options:
|
| A. MAC |
|
| B. STAC |
|
| C. DAC |
|
| D. RBAC |
Question 8 (1 point)
What function is the SNMP protocol designed to perform?
Question 8 options:
|
| A. To handle outgoing email for the network |
|
| B. To provide extended server management functions separate from the main network operating system |
|
| C. To provide remote access capabilities for the network administrator |
|
| D. To provide remote monitoring functions for the network administrator |
Question 9 (1 point)
Administrators typically use to collectively deal with user accounts that have common needs.
Question 9 options:
|
| A. Access rights |
|
| B. Inherited access |
|
| C. Group accounts |
|
| D. Permissions |
Question 10 (1 point)
What is the first step to take when hardening a servers operating system after it has been installed and configured for operation?
Question 10 options:
|
| A. Close any open TCP/UDP network ports |
|
| B. Configure Admin and user authentication systems |
|
| C. Remove or stop any unnecessary services, applications and protocols |
|
| D. Map the servers network topology to determine what devices are attached to it |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
