CompTIA Security+ Question B-55

The Chief Security Officer (CSO) is concerned about misuse of company assets and wishes to determine who may be responsible. Which of the following would be the BEST course of action?

A. Create a single, shared user account for every system that is audited and logged based upon time of use.
B. Implement a single sign-on application on equipment with sensitive data and high-profile shares.
C. Enact a policy that employees must use their vacation time in a staggered schedule.
D. Separate employees into teams led by a person who acts as a single point of contact for observation purposes.

Answer: C

Explanation:
A policy that states employees should use their vacation time in a staggered schedule is a way of employing mandatory vacations. A mandatory vacation policy requires all users to take time away from work while others step in and do the work of that employee on vacation. This will afford the CSO the opportunity to see who is using the company assets responsibly and who is abusing it.

CompTIA Network+ Question C-93

Company policies require that all network infrastructure devices send system level information to a centralized server. Which of the following should be implemented to ensure the network administrator can review device error information from one central location?

A. TACACS+ server
B. Single sign-on
C. SYSLOG server
D. Wi-Fi analyzer

Correct Answer: C

Explanation:
Syslog is a protocol designed to send log entries generated by a device or process called a facility across an IP network to a message collector, called a syslog server. A syslog message consists of an error code and the severity of the error. A syslog server would enable the network administrator to view device error information from a central location.

CompTIA Network+ Question B-68

A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?

A. 802.1x
B. 802.1p
C. Single sign-on
D. Kerberos

Correct Answer: A

Explanation:
For security purposes, some switches require users to authenticate themselves (that is, provide credentials, such as a username and password, to prove who they are) before gaining access to the rest of the network. A standards-based method of enforcing user authentication is IEEE 802.1X.

CompTIA A+ Core 2 Question I-8

Which of the following describes when an application is able to reuse Windows login credentials?

A. Access control list
B. Principle of least privilege
C. Single sign-on
D. Pass-through authentication

CompTIA A+ Core 2 Question A-18

A technician is configuring a new Windows computer for a home office. Which of the following steps should the technician take to secure the workstation? (Select TWO).

A. Rename default accounts
B. Disable Windows Update
C. Configure single sign-on
D. Run gpupdate tool
E. Disable guest account
F. Disable Action Center pop-ups

Correct Answer: AE