Exam 5: Access Control
Exam 1: The Threat Environment69 Questions
Exam 2: Planning and Policy105 Questions
Exam 3: Cryptography101 Questions
Exam 4: Secure Networks81 Questions
Exam 5: Access Control63 Questions
Exam 6: Firewalls68 Questions
Exam 7: Host Hardening78 Questions
Exam 8: Application Security67 Questions
Exam 9: Data Protection69 Questions
Exam 10: Incident and Disaster Response67 Questions
Exam 11: Module a Networking Concepts79 Questions
Select questions type
Unless logs are studied, they are useless.
Free
(True/False)
4.9/5
(32)
Correct Answer:
True
In, ________ the verifier determines whether the supplicant is a particular person.
Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
A
A(n) ________ is made of plastic and is approximately the size of a credit or debit card.
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
A
During enrollment in a biometric authentication system, step 1 is that the ________.
(Multiple Choice)
4.9/5
(33)
Assigning least permissions means that the system tends to fail safely.
(True/False)
4.9/5
(36)
________ refers to accuracy when a supplicant is not trying to deceive the system.
(Multiple Choice)
4.9/5
(30)
Usernames and passwords are rarely a target for hackers due to the difficulty in cracking them.
(True/False)
4.9/5
(39)
It is rarely safe to accept a digital certificate from a supplicant.
(True/False)
4.9/5
(32)
Trust means that one directory server will accept information from another.
(True/False)
4.9/5
(40)
If a systems administrator assigns access permissions to a group, the accounts of the individual members of that group automatically inherit those permissions.
(True/False)
4.8/5
(37)
Authentication servers communicate with directory servers using ________.
(Multiple Choice)
4.7/5
(31)
In regard to COBIT, entry must be all of the following EXCEPT ________.
(Multiple Choice)
4.8/5
(34)
In a hierarchical database system, O represents ________ and OU represents ________.
(Multiple Choice)
4.7/5
(35)
Which of the following passwords is NOT in the top five most common for two real-world data breaches mentioned in the text?
(Multiple Choice)
4.8/5
(38)
Which of the following is NOT one of the rules for working in secure areas?
(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)