WITH COMPLETE SOLUTIONS GRADED A++ LATEST
UPDATE
test
test
Consider the challenges with providing privileged management and authorization
on an enterprise network. Which of the following would the network system
administrator NOT be concerned with when configuring directory services?
Non-repudiation
An employee has arrived to work and logged into the network with their smart
card. This employee now has access to the company databases, email, and
shared network resources. Evaluate all of the basic authorization policies and
determine the policy best illustrated in this scenario.
Single Sign-On (SSO)
Compare all of the functions within directory services and determine which
statement accurately reflects the function of group memberships.
The key provided at authentication lists a user's group memberships, which in turn
allows certain access to resources on the network.
What are the most common, baseline account policies system administrators
implement on a secure domain network? (Select all that apply.)
, Use upper- and lower-case letters, numbers, and special characters for passwords/ Set
a lockout duration period of one hour.
Windows has several service account types, typically used to run processes and
background services. Which of the following statements about service accounts
is FALSE?
The local service account creates the host processes and starts Windows before the
user logs on.
A network administrator regularly reviews group membership and access control
lists for each resource. The administrator also looks for unnecessary accounts to
disable. What is the administrator executing in this situation?
Permission auditing
A system administrator has configured a security log to record unexpected
behavior and review the logs for suspicious activity. Consider various types of
audits to determine which type aligns with this activity.
Usage auditing
Analyze the following scenarios and determine which cases call for account
disablement over account lockout. (Select all that apply.)
Audit logs reveal suspicious activity on a privileged user's account/ A user's company
laptop and key fob are stolen at an airport.
An employee recently retired, and the employee received an exit interview,
returned a company-issued laptop, and had company-specific programs and
applications removed from a personal PC. Evaluate this employee's offboarding
process and determine what, if anything, remains to be done.