B. Access Control Library
C. Access Control List
D. Allowed Computer List
Question 2 . Which of the following access levels should be set?
A. Full access
B. No access
C. Read access
D. Write access
Question 3 . After performing a user identified and authenticating the system, to allow users to use resources, what do you need to do?
A. Must be authorized
B. Passed back
C. Encoded
D. Enabled
Question 4 . Which access rights allow us to store a file?
A. Read
B. Copy
C. Calibration
D. Remember
Question 5 . What permissions do we allow to edit the properties of a file?
A. Edit (Modiffy)
B. Copy
C. Change (Change)
D. Editing (Edit)
Question 6 . What should the maximum access rights be for users?
A. At least read and write rights
B. No access
C. Enough to do the job according to the authority
D. All rights reserved
Question 7 . Which account policy should be set up to prevent malicious attacks on user accounts?
A. Disable unused account
B. Limited time
C. Account expiration date
D. Limit logon times
Question 8 . After an indentifed user, what needs to be done before they log on to a computer network?
A. Verify password
B. They must log the encrypted user ID
C. Access is allowed with priority set
D. The administrator must enable to type
Question 9 . The minimum length of the password should be:
A. 12 to 15 characters
B. 3 to 5 characters
C. 8 characters
D. 1 to 3 characters
Question 10 . What should be done for password files to prevent an unauthorized user from breaking into the content?
A. Remove all access rights
B. Encrypt password file
C. Move offline to a floppy disk
D. Copy to a scarecrow file with a different name
Answer:
1 C
2. B
3. A
4. D
5. A
6. C
7. D
8. A
9C
10. B
See more: