Tag: security

Questions Related to security

  1. Policy Management

  2. Authentication

  3. Authorization

  4. Accounting


Correct Option: A,B,C,D
  1. Starting and stopping Policy Server processes

  2. Configuring Policy Server Executives

  3. Cache Management

  4. Key Management

  5. Global Settings

  6. User Management


Correct Option: A,B,C,D,E,F
  1. Access URL

  2. Authentication

  3. Authorization

  4. Accounting


Correct Option: B
  1. when the user logs off

  2. when the session expires

  3. when an administrator disables a user

  4. when user hits another URL


Correct Option: A,B,C
  1. 10 seconds

  2. 30 seconds

  3. 60 seconds

  4. 90 seconds


Correct Option: C
  1. The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability

  2. Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset

  3. Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset

  4. All of the above


Correct Option: A
  1. Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset

  2. The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability

  3. Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset

  4. All of the above


Correct Option: A