Exam 9: Access Control Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Providing your mother's maiden name as verification is an example of which of the following?

Free
(Multiple Choice)
4.9/5
(45)
Correct Answer:
Verified

D

The Internet is an example of which of the following network types?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

B

Which of the following statements best describes object capability?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

C

Which of the following is an example of authentication by characteristic?

(Multiple Choice)
4.9/5
(31)

Which of the following best describes a firewall?

(Multiple Choice)
4.9/5
(38)

Which of the following refers to security features that govern how users and processes communicate and interact with systems and resources?

(Multiple Choice)
4.8/5
(41)

Which of the following statements best describes segregation of duties?

(Multiple Choice)
4.8/5
(35)

Which of the following provides access to one or more applications through a single centralized interface?

(Multiple Choice)
4.9/5
(36)

Which of the following is the most dangerous and unwanted IDS/IPS decision state?

(Multiple Choice)
4.8/5
(38)

Which of the following network types is a segment of the internal network that requires a high degree of protection?

(Multiple Choice)
4.9/5
(36)

Which of the following is an access control that is based on a specific job role or function?

(Multiple Choice)
4.7/5
(38)

Which common attribute of all access controls is used to identify unique records in a set, such as a username?

(Multiple Choice)
4.9/5
(28)

Which of the following best describes an intrusion prevention system?

(Multiple Choice)
4.7/5
(38)

Which of the following is not an example of authentication by knowledge?

(Multiple Choice)
4.8/5
(32)

Using a smartcard and a one-time passcode is an example of which of the following authentication methods?

(Multiple Choice)
4.8/5
(35)

Which of the following statements best describes an administrative account control called dual control?

(Multiple Choice)
4.9/5
(40)

Which of the following provides a secure tunnel for transmitting data through an insecure network such as the Internet?

(Multiple Choice)
4.7/5
(37)

Using a palm scan for authentication is an example of which of the following?

(Multiple Choice)
4.7/5
(33)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)