0% found this document useful (0 votes)
29 views32 pages

Test - C5-C6 - Xem lại lần làm thử - UTEx

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views32 pages

Test - C5-C6 - Xem lại lần làm thử - UTEx

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Trạng thái Đã xong


Bắt đầu vào lúc Thứ Tư, 2 tháng 10 2024, 5:18 PM
Kết thúc lúc Thứ Tư, 2 tháng 10 2024, 5:34 PM
Thời gian thực 15 phút 53 giây
hiện
Điểm 24,17/39,00

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 1/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Điểm 6,20 trên 10,00 (61,97%)

Câu hỏi A system administrator has noticed that users change their password many times to cycle back to the
1 original password when their passwords expire. Which of the following would BEST prevent this behavior?

Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Enforce a minimum  A minimum password age policy defines the period that a password
password age policy. must be used for before it can be changed.

b. Increase the password expiration time frame

c. Prevent users from choosing their own passwords.

d. Assign users passwords based upon job role.

Your answer is correct.


The correct answer is: Enforce a minimum password age policy.

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 2/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi A recent online password audit has identified that stale accounts are at risk to brute force attacks. Which
2 the following controls would best mitigate this risk?

Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Password complexity

b. Account lockouts 

c. Account disablement

d. Password length

Your answer is correct.

The correct answer is: Account lockouts

Câu hỏi Which of the following is a best practice when securing a switch from physical access?
3
Đúng
Select one:

Đạt điểm 1,00 a. Disable unnecessary accounts


trên 1,00
b. Enable access lists

c. Disable  Disabling unused switch ports a simple method many network administrators use
unused to help secure their network from unauthorized access.
ports

d. Print baseline configuration

Your answer is correct.

The correct answer is: Disable unused ports

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 3/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to
4 that AP and gain unauthorized access. Which of the following would be the BEST way to mitigate this issue
and still provide coverage where needed? (Select TWO).
Đúng

Đạt điểm 1,00


trên 1,00
Select one or more:
a. Disable the wired ports

b. Switch from 802.11a to 802.11b

c. Enable MAC filtering 

d. Disable SSID broadcast 

e. Use channels 1, 4 and 7 only

Your answer is correct.

The correct answers are: Enable MAC filtering, Disable SSID broadcast

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 4/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Ann is a member of the Sales group. She needs to collaborate with Joe, a member of the IT group, to edit a
5 file. Currently, the file has the following permissions:
Ann: read/write
Đúng
Sales Group: read
Đạt điểm 1,00
trên 1,00
IT Group: no access
If a discretionary access control list is in place for the files owned by Ann, which of the following would be
the BEST way to share the file with Joe?

Select one:
a. Have the system administrator give Joe full access to the file.

b. Remove Joe from the IT group and add him to the Sales group.

c. Give Joe the  Joe needs access to only one file. He also needs to ‘edit’ that file. Editing
appropriate a file requires Read and Write access to the file. The best way to provide
access to the file Joe with the minimum required
directly. permissions to edit the file would be to give Joe the appropriate access to
the file directly.

d. Add Joe to the Sales group.

Your answer is correct.

The correct answer is: Give Joe the appropriate access to the file directly.

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 5/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi A security Operations Center was scanning a subnet for infections and found a contaminated machine. One
6 of the administrators disabled the switch port that the machine was connected to, and informed a local
technician of the infection. Which of the following steps did the administrator perform?
Đúng một phần

Đạt điểm 0,50


trên 1,00
Select one or more:
a. Escalation

b. Identification 

c. Preparation

d. Quarantine 

e. Notification

Your answer is partially correct.


Bạn đã chọn đúng 1.
The correct answers are: Notification, Quarantine

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 6/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi A security administrator must implement all requirements in the following corporate policy: Passwords
7 shall be protected against offline password brute force attacks. Passwords shall be protected against online
password brute force attacks. Which of the following technical controls must be implemented to enforce
Đúng một phần
the corporate policy? (Select THREE).
Đạt điểm 0,67
trên 1,00
Select one or more:
a. Password complexity

b. Minimum password length 

c. Screen locks

d. Account lockout 

e. Account expiration

f. Minimum password lifetime

Your answer is partially correct.

Bạn đã chọn đúng 2.


The correct answers are: Account lockout, Password complexity, Minimum password length

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 7/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi RADIUS provides which of the following?


8
Đúng
Select one:
Đạt điểm 1,00 a. Authentication, Authorization, Accounting 
trên 1,00
b. Authentication, Authorization, Availability

c. Authentication, Accounting, Auditing

d. Authentication, Authorization, Auditing

Your answer is correct.

The correct answer is: Authentication, Authorization, Accounting

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 8/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Which of the following types of access control uses fences, security policies, security awareness training, and
9 antivirus software to stop an unwanted or unauthorized activity from occurring?

Đúng

Đạt điểm 1,00


trên 1,00
Select one:
a. Corrective

b. Detective

c. Preventive  A preventive access control helps stop an unwanted or unauthorized activity from
occurring. Detective controls discover the activity after it has occurred, and
corrective controls attempt to reverse any problems caused by the activity.
Authoritative isn’t a valid type of access control.

d. Authoritative

Your answer is correct.


The correct answer is: Preventive

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 9/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi At an organization, unauthorized users have been accessing network resources via unused network wall
10 jacks. Which of the following would be used to stop unauthorized access?

Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Configure an access list.

b. Configure spanning tree protocol.

c. Configure  Port security in IT can mean several things. It can mean the physical control of all
port connection points, such as RJ-45 wall jacks or device ports, so that no
security. unauthorized users or unauthorized devices can attempt to connect into an open
port. This can be accomplished by locking down the wiring closet and server vaults
and then disconnecting the workstation run from the patch panel (or punch-down
block) that leads to a room’s wall jack. Any unneeded or unused wall jacks can
(and should) be physically disabled in this manner. Another option is to use a
smart patch panel that can monitor the MAC address of any device connected to
each and every wall port across a building and detect not just when a new device is
connected to an empty port, but also when a valid device is disconnected or
replaced by an invalid device.

d. Configure loop protection.

Your answer is correct.


The correct answer is: Configure port security.

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 10/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi An auditing team has found that passwords do not meet best business practices. Which of the following will
11 MOST increase the security of the passwords? (Select TWO).

Đúng một phần


Select one or more:
Đạt điểm 0,50
trên 1,00 a. Password Complexity 

b. Password Length

c. Password Age 

d. Password Expiration

e. Password History

Your answer is partially correct.


Bạn đã chọn đúng 1.
The correct answers are: Password Complexity, Password Length

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 11/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Connections using point-to-point protocol authenticate using which of the following? (Select TWO).
12
Select one or more:
Đúng

Đạt điểm 1,00 a. RC4


trên 1,00
b. PAP  A password authentication protocol (PAP) is an authentication protocol that uses a
password. PAP is used by Point to Point Protocol to validate users before allowing them
access
to server resources.

c. RIPEMD

d. CHAP  CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to
validate the identity of remote clients. CHAP periodically verifies the identity of the
client by
using a three-way handshake.

e. Kerberos

Your answer is correct.


The correct answers are: PAP, CHAP

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 12/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi The internal audit group discovered that unauthorized users are making unapproved changes to various
13 system configuration settings. This issue occurs when previously authorized users transfer from one
department to another and maintain the same credentials. Which of the following controls can be
Sai
implemented to prevent such unauthorized changes in the future?
Đạt điểm 0,00
trên 1,00
Select one:
a. Least privilege

b. Account lockout

c. Periodic access review

d. Group based privileges 

Your answer is incorrect.


The correct answer is: Least privilege

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 13/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Which of the following would be used to allow a subset of traffic from a wireless network to an internal
14 network?

Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Load balancers

b. Access control list 

c. 802.1X

d. Port security

Your answer is incorrect.


The correct answer is: 802.1X

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 14/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi A company requires that a user’s credentials include providing something they know and something they
15 are in order to gain access to the network. Which of the following types of authentication is being
described?
Đúng

Đạt điểm 1,00


trên 1,00
Select one:
a. Two-  Two-factor authentication is when two different authentication factors are provided for
factor authentication purposes. In this case, “something they know and something they are”.

b. Token

c. Kerberos

d. Biometrics

Your answer is correct.


The correct answer is: Two-factor

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 15/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Which of the following controls would allow a company to reduce the exposure of sensitive systems from
16 unmanaged devices on internal networks?

Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Password strength

b. BGP

c. 802.1x 

d. Data encryption

Your answer is correct.


The correct answer is: 802.1x

Câu hỏi Which of the following is a management control?


17
Sai
Select one:

Đạt điểm 0,00 a. SYN attack prevention


trên 1,00
b. Written security policy

c. Logon banners

d. Access Control List (ACL) 

Your answer is incorrect.


The correct answer is: Written security policy

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 16/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi A company determines a need for additional protection from rogue devices plugging into physical ports
18 around the building. Which of the following provides the highest degree of protection from unauthorized
wired network access?
Đúng

Đạt điểm 1,00


trên 1,00
Select one:
a. Intrusion Prevention Systems

b. MAC filtering

c. 802.1x 

d. Flood guards

Your answer is correct.

The correct answer is: 802.1x

Câu hỏi A user ID and password together provide which of the following?
19
Đúng
Select one:

Đạt điểm 1,00 a. Authorization


trên 1,00
b. Authentication 

c. Identification

d. Auditing

Your answer is correct.

The correct answer is: Authentication

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 17/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Which of the following best practices makes a wireless network more difficult to find?
20
Select one:
Đúng

Đạt điểm 1,00 a. Implement MAC filtering


trên 1,00
b. Disable SSID broadcast 

c. UseWPA2-PSK

d. Power down unused WAPs

Your answer is correct.

The correct answer is: Disable SSID broadcast

Câu hỏi XYZ Company has a database containing personally identifiable information for all its customers. Which of
21 the following options would BEST ensure employees are only viewing information associated to the
Đúng
customers they support?

Đạt điểm 1,00


trên 1,00
Select one:
a. Encryption

b. Auditing

c. Access Control 

d. Data ownership

Your answer is correct.


The correct answer is: Access Control

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 18/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi What is the switch called in an 802.1x configuration?


22
Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Supplicant

b. RADIUS server 

c. AAA server

d. Authenticator

Your answer is incorrect.

The correct answer is: Authenticator

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 19/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Pete, a developer, writes an application. Jane, the security analyst, knows some things about the overall
23 application but does not have all the details. Jane needs to review the software before it is released to
production. Which of the following reviews should Jane conduct?
Đúng

Đạt điểm 1,00


trên 1,00
Select one:
a. Black Box Testing

b. Gray  Gray box testing, also called gray box analysis, is a strategy for software debugging in
Box which the tester has limited knowledge of the internal details of the program.
Testing

c. Business Impact Analysis

d. White Box Testing

Your answer is correct.


The correct answer is: Gray Box Testing

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 20/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Which of the following would allow users from outside of an organization to have access to internal
24 resources?

Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. VLANS

b. VPN 

c. NAC

d. NAT

Your answer is correct.


The correct answer is: VPN

Câu hỏi An incident occurred when an outside attacker was able to gain access to network resources. During the
25 incident response, investigation security logs indicated multiple failed login attempts for a network
administrator. Which of the following controls, if in place could have BEST prevented this successful attack?
Sai

Đạt điểm 0,00


trên 1,00
Select one:
a. Password complexity

b. Account lockout

c. Account expiration 

d. Password history

Your answer is incorrect.

The correct answer is: Account lockout

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 21/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi What is the end device that sends credentials for 802.1x called?
26
Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. RADIUS server

b. Supplicant  The end device that sends credentials is called the supplicant. The supplicant is a
piece of software in the operating system that supplies the credentials for AAA
authentication.

c. Authenticator

d. AAA server

Your answer is correct.

The correct answer is: Supplicant

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 22/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Users require access to a certain server depending on their job function. Which of the following would be
27 the MOST appropriate strategy for securing the server?

Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Discretionary access control

b. Role  Role-based Access Control is basically based on a user’s job description. When a
based user is assigned a specific role in an environment, that user’s access to objects is
access granted based on the required tasks of that role.
control

c. Mandatory access control

d. Common access card

Your answer is correct.


The correct answer is: Role based access control

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 23/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi A customer has provided an email address and password to a website as part of the login process. Which of
28 the following BEST describes the email address?

Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Identification

b. Access control

c. Authorization 

d. Authentication

Your answer is incorrect.


The correct answer is: Identification

Câu hỏi A quality assurance analyst is reviewing a new software product for security, and has complete access to
29 the code and data structures used by the developers. This is an example of which of the following types of
testing?
Sai

Đạt điểm 0,00


trên 1,00
Select one:
a. Gray box

b. Penetration

c. Black box 

d. White box

Your answer is incorrect.

The correct answer is: White box

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 24/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi A password history value of three means which of the following?
30
Select one:
Đúng

Đạt điểm 1,00 a. After three hours a password must be re-entered to continue
trên 1,00
b. A password cannot be reused once changed for three years.

c. Three different passwords are  Password History defines the number of unique new
used before one can be passwords a user must use before an old password can be
reused. reused.

d. The server stores passwords in the database for three days.

Your answer is correct.

The correct answer is: Three different passwords are used before one can be reused.

Câu hỏi During the information gathering stage of a deploying role-based access control model, which of the
31 following information is MOST likely required?

Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Conditional rules under which certain systems may be accessed

b. Clearance levels of all company personnel 

c. Matrix of job titles with required access privileges

d. Normal hours of business operation

Your answer is incorrect.

The correct answer is: Matrix of job titles with required access privileges

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 25/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi A process in which the functionality of an application is tested without any knowledge of the internal
32 mechanisms of the application is known as:

Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Gray box testing

b. White box testing 

c. Black box testing

d. Black hat testing

Your answer is incorrect.


The correct answer is: Black box testing

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 26/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Internet banking customers currently use an account number and password to access their online accounts.
33 The bank wants to improve security on high value transfers by implementing a system which call users back
on a mobile phone to authenticate the transaction with voice verification. Which of the following
Sai
authentication factors are being used by the bank?
Đạt điểm 0,00
trên 1,00
Select one:
a. Something you have, something you are, and something you know 

b. Something you are, something you do and something you know

c. Something you know, something you do, and something you have

d. Something you do, somewhere you are, and something you have

Your answer is incorrect.

The correct answer is: Something you are, something you do and something you know

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 27/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Which of the following is the BEST reason to provide user awareness and training programs for
34 organizational staff?

Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. To detail business impact analyses

b. To ensure proper use of social media

c. To reduce  Ideally, a security awareness training program for the entire organization
organizational should cover the following areas:
IT risk Importance of security
Responsibilities of people in the organization
Policies and procedures
Usage policies
Account and password-selection criteria
Social engineering prevention
You can accomplish this training either by using internal staff or by hiring
outside trainers. This type of training will significantly reduce the
organizational IT risk.

d. To train staff on zero-days

Your answer is correct.


The correct answer is: To reduce organizational IT risk

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 28/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi A company wants to ensure that all credentials for various systems are saved within a central database so
35 that users only have to login once for access to all systems. Which of the following would accomplish this?

Đúng
Select one:
Đạt điểm 1,00
trên 1,00 a. Same Sign-On

b. Smart card access

c. Multi-factor authentication

d. Single  Single sign-on means that once a user (or other subject) is authenticated into a realm,
Sign- re-authentication is not required for access to resources on any realm entity. Single
On sign-on is
able to internally translate and store credentials for the various mechanisms, from the
credential used for original authentication.

Your answer is correct.


The correct answer is: Single Sign-On

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 29/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi The method to provide end users of IT systems and applications with requirements related to acceptable
36 use, privacy, new threats and trends, and use of social networking is:

Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Legal compliance training.

b. Role-based security training.

c. BYOD security training. 

d. Security awareness training.

Your answer is incorrect.


The correct answer is: Security awareness training.

Câu hỏi After a production outage, which of the following documents contains detailed information on the order in
37 which the system should be restored to service?

Sai
Select one:
Đạt điểm 0,00
trên 1,00 a. Succession planning

b. Information security plan 

c. Business impact analysis

d. Disaster recovery plan

Your answer is incorrect.

The correct answer is: Disaster recovery plan

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 30/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi Which technology will give selective access to the network based upon
38 authentication?

Sai

Đạt điểm 0,00


trên 1,00
Select one:
a. 802.1x

b. ACLs

c. Firewall

d. 802.1Q 

Your answer is incorrect.

The correct answer is: 802.1x

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 31/32
10/2/24, 5:34 PM Test_C5-C6: Xem lại lần làm thử | UTEx

Câu hỏi A penetration tester was able to obtain elevated privileges on a client workstation and multiple servers
39 using the credentials of an employee. Which of the following controls would mitigate these issues? (Select
TWO)
Đúng một phần

Đạt điểm 0,50


trên 1,00
Select one or more:
a. Time of day restrictions

b. Separation of duties

c. Least privilege 

d. Password history 

e. Discretionary access control

f. Account expiration

Your answer is partially correct.

Bạn đã chọn đúng 1.


The correct answers are: Least privilege, Account expiration

https://utexlms.hcmute.edu.vn/mod/quiz/review.php?attempt=692665&cmid=174379 32/32

You might also like