give to remi

.docx

School

Utica College *

*We aren’t endorsed by this school

Course

333

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

11

Uploaded by JusticeDangerWolverine42

Report
Module 3 Student Study Guide - Part 1   1. What process identifies and grants access to a user who is trying to access a system? A. Credibility B. Authorization C. Authentication D. Encryption Ans: Authentication Proof: Authentication is the process of identifying and granting access to some user, usually a person, who is trying to access a system Page: 528       2. What process determines what a legitimate user can and cannot do on a system? A. Accessibility B. Authorization C. Permission propagation D. Inheritance Ans: Authorization Proof: authorization: the process that defines what resources an authenticated user may access and what he or she may do with those resources Page: 528    
  3. On every Windows system, each record in an encrypted database of usernames and passwords is called a(n) _______________. A. Group account B. Single account C. Specialized account D. Local user account Ans:  Local user account Proof: Every Windows system stores the user accounts as an encrypted database of usernames and passwords. Windows calls each record in this database a local user account. Page: 528   8. What type of group enables someone who does not have an account on the system to log on? A. Administrator B. Standard user C. Power user D. Guest Ans: Guest Proof: Guests group enables someone who does not have an account on the system to log on by using a guest account. Page: 532     10. A password _______________ policy forces users to select a new password periodically. A. permissions B. disabling
C. expiration D. anti-hack Ans: expiration Proof: password expiration policy that forces users to select a new password periodically Page: 530   11. Which character in a password is most helpful in defeating common word hacks? A. @ B. t C. x D. w Ans: @ Proof: Using non-alphanumeric  characters  makes  any  password  much  more  difficult  to  crack Page: 530   12. A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols. A. six B. eight C. 10 D. 256 Ans: Eight Proof: Make sure users have a strong password: at least eight characters in length, including letters, numbers, and nonalphanumeric symbols. Page: 530
  16. Which NTFS permission allows an account to seize control of a file or folder owned by another account? A. File permissions B. Take Ownership permission C. Folder permissions D. Change permission Ans: Take Ownership permission Proof: With the Take Ownership permission, anyone with the permission can seize control of a file or folder Page: 544   17. With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts. A. Change B. List C. Read & Execute D. Modify Ans: Change Proof: Change permission. An account with this permission can give or take away permissions for other accounts Page: 545   18. By default, who has complete control over a folder or file? A. Owner B. Administrator C. All users
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help