89%(37)33 out of 37 people found this document helpful
This preview shows page 5 - 7 out of 8 pages.
QUESTION 32Which of the following statements is true regarding domain controllers?They require less hardware than a standard server.They require no additional administrative time and resources than any other computer.They can have many other applications on them.They store the actual database of Active Directory shared resources.2.00000 points SavedQUESTION 33The U.S. Department of Commerce defines ________ as information that can be used to distinguish ortrace an individual’s identity, such as their name, social security number, biometric records, and so on,alone or when combined with other personal or identifying information that is linked or linkable to aspecific individual, such as date and place of birth, mother’s maiden name, and so on.2.00000 points SavedQUESTION 34What term is used to describe a potential attack on a system?2.00000 points SavedClick Save and Submit to save and submit. Click Save All Answers to save all answers.
3/10/2018Take Test: Midterm Exam – 2018_SPR_MAIN_Access Control_31;6/8QUESTION 35_____________ is aimed primarily at the financial services industry.2.00000 points SavedSavedQUESTION 36______________ is any strategy that tricks a user into giving up his or her password or granting accessto an attacker.2.00000 points SavedSavedHeightened accessSocial engineeringPassword crackingVulnerability exploitationQUESTION 37A(n) ________________ is a high-level document that defines how an organization will assign andenforce access control rights.2.00000 points SavedSavedQUESTION 38Information ____________ ensures that private or sensitive information is not disclosed to unauthorizedindividuals.2.00000 points SavedQUESTION 39The requester of sensitive information should not receive access just because of his or her clearance,position, or rank. The requester must also establish a valid need to see the information. The term forthis is ________.2.00000 points SavedQUESTION 40In a Windows environment, __________ is a powerful tool that enables security administrators to shareuser and group definitions, and even directory services, by defining domains.Domain DefinitionsPowerShellActive DirectoryMicrosoft Assessment and Planning (MAP) toolkit2.00000 points SavedSaved