Exam 2: Access Control

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Smart cards are less expensive to implement than memory cards.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

False

What defines the method for identifying and authenticating users and the level of access that is granted to users?

Free
(Multiple Choice)
4.9/5
(41)
Correct Answer:
Verified

D

Passwords are considered weaker than passphrases.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

True

Type I errors are more dangerous than Type II errors.

(True/False)
4.8/5
(40)

When considering FAR, FRR, and CER, smaller values are better.

(True/False)
4.8/5
(38)

Pharming and phishing are password attacks.

(True/False)
4.8/5
(34)

A network-based IDS is the most common IDS and monitors network traffic on a local network segment.

(True/False)
4.8/5
(39)

Which of the following are physical access controls?

(Multiple Choice)
4.9/5
(33)

Which of the following is an example of three-factor authentication?

(Multiple Choice)
4.9/5
(39)

A deny-by-default stance is less strict than an allow-by-default stance.

(True/False)
4.8/5
(36)

Knowledge factor authentication is also referred to as Type I authentication factor.

(True/False)
4.9/5
(40)

Content-dependent access control is based on subject or object attributes or environmental characteristics.

(True/False)
4.8/5
(29)

Of the options given, which biometric consideration is MOST important?

(Multiple Choice)
5.0/5
(36)

In which access control category do fire extinguishers fall?

(Multiple Choice)
4.8/5
(24)

Which type of IDS analyzes traffic and compares it to normal traffic to determine whether said traffic is a threat?

(Multiple Choice)
4.8/5
(41)

In which access control model is all that is not expressly permitted is forbidden?

(Multiple Choice)
4.8/5
(30)

Which malicious software collects private user data?

(Multiple Choice)
4.9/5
(32)

Which accountability mechanism reviews facility and perimeter protections?

(Multiple Choice)
4.9/5
(28)

Retina scans have a higher accuracy than any other biometric scan.

(True/False)
4.8/5
(20)

Which concept ensures that data is protected from unauthorized modification or data corruption?

(Multiple Choice)
4.8/5
(43)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)