Exam 5: Access Control
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
A ________ card stores authentication data.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
C
In military security, the term multilevel security means multifactor security.
Free
(True/False)
4.8/5
(30)
Correct Answer:
False
Identity management is really just another form of risk management.
Free
(True/False)
5.0/5
(37)
Correct Answer:
True
Compared to access control based on individual accounts, RBAC is ________.
(Multiple Choice)
4.8/5
(31)
In Kerberos, the ________ is sent from the Kerberos server to the verifier.
(Multiple Choice)
4.9/5
(41)
Biometric authentication is the strongest form of authentication.
(True/False)
4.9/5
(30)
As far as possible, identities should be managed by people closest to the situation.
(True/False)
4.8/5
(41)
________ is a form of identification that identifies a person as being a member of a group.
(Multiple Choice)
4.9/5
(29)
In Kerberos, the ________ is the supplicant's proof that it has already authenticated itself with the Kerberos Server.
(Multiple Choice)
4.8/5
(44)
During enrollment, the scanner sends ________ to the authentication system.
(Multiple Choice)
4.9/5
(28)
Password cracking is usually done over the network by trying many passwords to log into an account.
(True/False)
4.9/5
(37)
Verification requires more matches against templates than does identification.
(True/False)
4.9/5
(30)
________ is the process of assessing the identity of each individual claiming to have permission to use a resource.
(Multiple Choice)
4.8/5
(29)
For watch lists of criminals, a false ________ means that an innocent person is identified as a criminal.
(Multiple Choice)
5.0/5
(30)
________ is the process of collecting information about the activities of each individual in log files for immediate and later analysis.
(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 124
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)