Exam 5: Access Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ________ card stores authentication data.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

C

In military security, the term multilevel security means multifactor security.

Free
(True/False)
4.8/5
(30)
Correct Answer:
Verified

False

Identity management is really just another form of risk management.

Free
(True/False)
5.0/5
(37)
Correct Answer:
Verified

True

Compared to access control based on individual accounts, RBAC is ________.

(Multiple Choice)
4.8/5
(31)

In Kerberos, the ________ is sent from the Kerberos server to the verifier.

(Multiple Choice)
4.9/5
(41)

Biometric authentication is the strongest form of authentication.

(True/False)
4.9/5
(30)

As far as possible, identities should be managed by people closest to the situation.

(True/False)
4.8/5
(41)

________ can be much shorter than ________.

(Multiple Choice)
4.8/5
(33)

________ is a form of identification that identifies a person as being a member of a group.

(Multiple Choice)
4.9/5
(29)

In Kerberos, the ________ is the supplicant's proof that it has already authenticated itself with the Kerberos Server.

(Multiple Choice)
4.8/5
(44)

Which of the following statements is true about log files?

(Multiple Choice)
4.7/5
(38)

The ________ gives the verifier a symmetric session key.

(Multiple Choice)
4.8/5
(33)

During enrollment, the scanner sends ________ to the authentication system.

(Multiple Choice)
4.9/5
(28)

Password cracking is usually done over the network by trying many passwords to log into an account.

(True/False)
4.9/5
(37)

Verification requires more matches against templates than does identification.

(True/False)
4.9/5
(30)

________ is the process of assessing the identity of each individual claiming to have permission to use a resource.

(Multiple Choice)
4.8/5
(29)

PCs should require login screens with complex passwords.

(True/False)
4.8/5
(30)

For watch lists of criminals, a false ________ means that an innocent person is identified as a criminal.

(Multiple Choice)
5.0/5
(30)

In CobiT, entry must be ________.

(Multiple Choice)
4.8/5
(30)

________ is the process of collecting information about the activities of each individual in log files for immediate and later analysis.

(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 124
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)