ITF Module 5 Review Test - Questions and Answers Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content on the page. Should
...
ITF Module 5 Review Test - Questions and Answers Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content on the page. Should you proceed? No-this is a classic phishing attack and your friend's computer could be infected with a virus or Trojan. Check whether they sent the link in good faith first True or false? An OEM site is a reputable source of management software and drivers for a particular system. True—an Original Equipment Manufacturer (OEM) in the IT industry, such as Dell or HP, assembles systems made from the parts and software of various other suppliers. The components used in their systems may be specific to their brand and so they host their own support files for any system they sell. What are the four processes of an access control system? Identification, Authentication, Authorization, and Accounting. Users should only be granted the minimum sufficient permissions. What system policy ensures that users do not receive rights unless granted explicitly? Implicit deny What is the main type of non-discretionary access control? Mandatory Access Control—though any rules-based system might restrict discretionary aspects of granting rights. What type of control prevents a user from denying they performed an action? Non-repudiation. Examples of controls providing non-repudiation include logging, video surveillance, biometrics, signatures, and receipts/tokens. What sort of account allows someone to access a computer without providing a user name or password? Guest account. How does a one-time password work? The password is generated by an asymmetric encryption algorithm. This means that the authenticating server can determine that the number was generated by a particular device (fob) at a particular time. When used with a PIN, it also proves that the password was input by a particular user. What type of system allows a user to authenticate once to access multiple services? Single Sign-On (SSO). What type of cryptographic operation(s) are non-reversible?
[Show More]