Exam 5: Access Control
Exam 1: The Threat Environment69 Questions
Exam 2: Planning and Policy105 Questions
Exam 3: Cryptography101 Questions
Exam 4: Secure Networks81 Questions
Exam 5: Access Control63 Questions
Exam 6: Firewalls68 Questions
Exam 7: Host Hardening78 Questions
Exam 8: Application Security67 Questions
Exam 9: Data Protection69 Questions
Exam 10: Incident and Disaster Response67 Questions
Exam 11: Module a Networking Concepts79 Questions
Select questions type
In planning authorizations, it is important to follow ________.
(Multiple Choice)
4.9/5
(34)
A USB token is a small device that plugs into a computer's USB port to identify the owner.
(True/False)
4.9/5
(40)
Most companies use ________ to store data centrally in their firms.
(Multiple Choice)
4.8/5
(28)
Which of the following can negate the strength of two-factor authentication?
(Multiple Choice)
4.8/5
(47)
Directory servers are central repositories for information about people, equipment, software, and databases.
(True/False)
4.8/5
(31)
The false acceptance rate increases as the number of templates increases.
(True/False)
4.8/5
(37)
In, ________ the verifier determines whether the supplicant is a particular person.
(Multiple Choice)
4.8/5
(26)
________ is having the ability to create a new password for an account.
(Multiple Choice)
5.0/5
(36)
Which of the following is arguably the most popular central authentication server standard?
(Multiple Choice)
4.7/5
(38)
A physical access card and a PIN are an example of ________.
(Multiple Choice)
4.8/5
(39)
________ records the actions that an account owner takes on a resource.
(Multiple Choice)
4.9/5
(46)
Central authentication servers are quite expensive and tend to not reduce costs for a company.
(True/False)
4.7/5
(33)
The International Data Corporation estimates that ________ percent of all accounts in larger corporations are inappropriate.
(Multiple Choice)
4.9/5
(30)
A directory server database schema is a hierarchical collection of ________.
(Multiple Choice)
4.9/5
(40)
A proximity access token contains a small ________ as a new alternative to physical security.
(Multiple Choice)
4.9/5
(41)
Showing 21 - 40 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)