100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CIS 333 Week 3 Quiz|Questions and Answers|2025 Update|100% Correct. $13.99
Add to cart

Exam (elaborations)

CIS 333 Week 3 Quiz|Questions and Answers|2025 Update|100% Correct.

 0 purchase

CIS 333 Week 3 Quiz|Questions and Answers|2025 Update|100% Correct.

Preview 2 out of 11  pages

  • March 25, 2025
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • cis 333
  • cis 333 week 3
All documents for this subject (13)
avatar-seller
Wiseman
Week 3 Quiz

Which security mechanism uses a unique list that meets the following specifications:

e The list is embedded directly in the object itself.

The list defines which subjects have access to certain objects.

The list specifies the level or type of access allowed to certain objects.

> () UserACL

() Conditional access

@® Mandatory access control

() Hashing

6
What is the process of controlling access to resources such as computers, files, or printers called?

() Conditional access

—> () Authorization

Mandatory access control

@ Authentication

Cunlamasina

bo

Which of the following objects identifies a set of users with similar access needs?

> @® Group

O DACL
() Permissions

(O SACL

, Which of the following identifies the type of access that is allowed or denied for an object?

User rights

SACL

Permissions

DACL



Which of the following is used by Microsoft for auditing in order to identify past actions performed by users on an object?

@® DACL

(O Userrights

SACL
N




Permissions




Which type of group can be used for controlling access to objects?

> @ Security
() DACL

() Authorization

() Distribution

bo

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers
group, which has access to a special shared folder.
Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group.
What should you do?

() Manually refresh Group Policy settings on the file server.
() Manually refresh Group Policy settings on his computer.
() Add his user account to the ACL for the shared folder.

> @ Have Marcus log off and log back in.



Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?

Cookie

Account policy

Access token

Proxy

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Wiseman. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

69484 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling
$13.99
  • (0)
Add to cart
Added