give to remi
.docx
keyboard_arrow_up
School
Utica College *
*We aren’t endorsed by this school
Course
333
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
11
Uploaded by JusticeDangerWolverine42
Module 3 Student Study Guide - Part 1
1. What process identifies and grants access to a user who is trying to access a system?
A. Credibility
B. Authorization
C. Authentication
D. Encryption
Ans: Authentication
Proof: Authentication is the process of identifying and granting access to some user, usually a person, who is trying to access a system
Page: 528
2. What process determines what a legitimate user can and cannot do on a system?
A. Accessibility
B. Authorization
C. Permission propagation
D. Inheritance
Ans: Authorization
Proof: authorization: the process that defines what resources an authenticated user may access and what he or she may do with those resources
Page: 528
3. On every Windows system, each record in an encrypted database of usernames and passwords is called a(n) _______________.
A. Group account
B. Single account
C. Specialized account
D. Local user account
Ans: Local user account
Proof: Every Windows system stores the user accounts as an encrypted database of usernames and passwords. Windows calls each record in this database a local user account.
Page: 528
8. What type of group enables someone who does not have an account on the system to log on?
A. Administrator
B. Standard user
C. Power user
D. Guest
Ans: Guest
Proof: Guests group enables someone who does not have an account on the system to log on by using a guest account.
Page: 532
10. A password _______________ policy forces users to select a new password periodically.
A. permissions
B. disabling
C. expiration
D. anti-hack
Ans: expiration
Proof:
password expiration policy that forces users to select a new password periodically
Page: 530
11. Which character in a password is most helpful in defeating common word hacks?
A. @
B. t
C. x
D. w
Ans: @
Proof: Using non-alphanumeric characters makes any password much more difficult to crack
Page: 530
12. A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols.
A. six
B. eight
C. 10
D. 256
Ans: Eight
Proof: Make sure users have a strong password: at least eight characters in length, including letters, numbers, and nonalphanumeric symbols.
Page: 530
16. Which NTFS permission allows an account to seize control of a file or folder owned by another account?
A. File permissions
B. Take Ownership permission
C. Folder permissions
D. Change permission
Ans: Take Ownership permission
Proof: With the Take Ownership permission, anyone with the permission can seize control of a file or folder
Page: 544
17. With the ____________________ permission for an NTFS partition, you can give or take away permissions for other accounts.
A. Change
B. List
C. Read & Execute
D. Modify
Ans: Change
Proof: Change permission. An account with this permission can give or take away permissions for other accounts
Page: 545
18. By default, who has complete control over a folder or file?
A. Owner
B. Administrator
C. All users
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help