3.1 Identify and apply industry best practices for access control methods[edit | edit source]
Implicit deny
Least privilege
Separation of duties
Job rotation
3.2 Explain common access control models and the differences between each[edit | edit source]
MAC
DAC
Role & Rule based access control
3.3 Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges[edit | edit source]
3.4 Apply appropriate security controls to file and print resources[edit | edit source]
3.5 Compare and implement logical access control methods[edit | edit source]
ACL
Group policies
Password policy
Domain password policy
User names and passwords
Time of day restrictions
Account expiration
Logical tokens
3.6 Summarize the various authentication models and identify the components of each[edit | edit source]
One, two and three-factor authentication
Single sign-on
3.7 Deploy various authentication models and identify the components of each[edit | edit source]
Biometric reader
RADIUS (Remote Authentication Dial In User Service)
RAS (Remote Access Services)
LDAP (Lightweight Directory Access Protocol)
Remote access policies
Remote authentication
VPN (Virtual Private Network)
Kerberos
CHAP (Challenge-Handshake Authentication Protocol)