Exam 5: Access Control

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Unless logs are studied, they are useless.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

True

In, ________ the verifier determines whether the supplicant is a particular person.

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

A

A(n) ________ is made of plastic and is approximately the size of a credit or debit card.

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

A

During enrollment in a biometric authentication system, step 1 is that the ________.

(Multiple Choice)
4.9/5
(33)

The labor costs of provisioning are very expensive.

(True/False)
4.9/5
(38)

Assigning least permissions means that the system tends to fail safely.

(True/False)
4.9/5
(36)

________ refers to accuracy when a supplicant is not trying to deceive the system.

(Multiple Choice)
4.9/5
(30)

Usernames and passwords are rarely a target for hackers due to the difficulty in cracking them.

(True/False)
4.9/5
(39)

It is rarely safe to accept a digital certificate from a supplicant.

(True/False)
4.9/5
(32)

Trust means that one directory server will accept information from another.

(True/False)
4.9/5
(40)

If a systems administrator assigns access permissions to a group, the accounts of the individual members of that group automatically inherit those permissions.

(True/False)
4.8/5
(37)

A(n) ________ is something that represents something else.

(Multiple Choice)
4.8/5
(31)

Authentication servers communicate with directory servers using ________.

(Multiple Choice)
4.7/5
(31)

Which of the following is FALSE about log files?

(Multiple Choice)
4.9/5
(40)

In regard to COBIT, entry must be all of the following EXCEPT ________.

(Multiple Choice)
4.8/5
(34)

Microsoft's directory server product is called ________.

(Multiple Choice)
4.9/5
(32)

In a hierarchical database system, O represents ________ and OU represents ________.

(Multiple Choice)
4.7/5
(35)

Which of the following passwords is NOT in the top five most common for two real-world data breaches mentioned in the text?

(Multiple Choice)
4.8/5
(38)

________ occurs if a system will not enroll a user.

(Multiple Choice)
4.9/5
(33)

Which of the following is NOT one of the rules for working in secure areas?

(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)