Exam 5: Access Control
Exam 1: The Threat Environment69 Questions
Exam 2: Planning and Policy105 Questions
Exam 3: Cryptography101 Questions
Exam 4: Secure Networks81 Questions
Exam 5: Access Control63 Questions
Exam 6: Firewalls68 Questions
Exam 7: Host Hardening78 Questions
Exam 8: Application Security67 Questions
Exam 9: Data Protection69 Questions
Exam 10: Incident and Disaster Response67 Questions
Exam 11: Module a Networking Concepts79 Questions
Select questions type
A person or process that requests access is known as the supplicant.
(True/False)
4.9/5
(40)
For group or team work in a company, it is often recommended that all group members share a single account and, therefore, a single password.
(True/False)
4.9/5
(36)
Which of the following is FALSE in regard to the comparison of access control to RBAC and individual accounts?
(Multiple Choice)
4.8/5
(35)
What approximate percentage of calls to help desks involve lost passwords?
(Multiple Choice)
4.9/5
(36)
Which of the following statements accurately describes fingerprint recognition?
(Multiple Choice)
4.8/5
(39)
When a reader in a biometric authentication system scans a person's biometric data, what is used?
(Multiple Choice)
4.8/5
(43)
When a user is scanned a second time, the reader in a biometric authentication system processes the ________ information to create key features.
(Multiple Choice)
4.9/5
(39)
Authorizations for individuals can also be referred to as ________.
(Multiple Choice)
4.8/5
(40)
PKI servers must support the downloading of ________ and must respond to ________ queries.
(Multiple Choice)
4.7/5
(40)
Which of the following is NOT a part of central authentication servers?
(Multiple Choice)
4.7/5
(34)
Auditing predicts what a person or program is likely to do in the future.
(True/False)
4.7/5
(47)
In following the principle of least permissions, each person should only get the permissions that he or she absolutely needs to do his or her job.
(True/False)
4.7/5
(44)
Media such as cameras and mobile phones with cameras in secured areas may allow a physical penetration attacker to steal information.
(True/False)
4.8/5
(43)
Which of the following is NOT one of the three major elements of an assertion?
(Multiple Choice)
4.7/5
(41)
For easy remembering, many companies suggest that you record a PIN that you've selected on the physical access card you've been given.
(True/False)
4.9/5
(44)
Magnetic stripe cards are________, only containing data; smart cards are ________.
(Multiple Choice)
4.8/5
(31)
Typically, military and national security organizations have a multilevel security system.
(True/False)
4.8/5
(38)
Showing 41 - 60 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)