Exam 5: Access Control
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
A(n) ________ is the set of attributes about a person or resource that must be revealed in a particular context.
(Multiple Choice)
4.8/5
(43)
Which of the following is one of the four bases for authentication credentials?
(Multiple Choice)
4.8/5
(42)
________ is the centralized policy based management of all information required for access to corporate systems by people, machines, programs, or other resources.
(Multiple Choice)
4.9/5
(35)
In the military, departments do not have the ability to alter access control rules set by higher authorities in ________.
(Multiple Choice)
4.7/5
(35)
________ is a social engineering trick where an intruder may follow an authorized user through a door that the authorized user opens with an access device.
(Multiple Choice)
4.7/5
(33)
For watch lists of criminals, a false acceptance is worse than a false rejection from a security viewpoint.
(True/False)
4.9/5
(38)
Authentication is the process of collecting information about the activities of each individual in log files for immediate and later analysis.
(True/False)
4.9/5
(30)
Most users who have access to servers use reusable passwords for authentication.
(True/False)
4.7/5
(39)
It is illegal to go through a company's trash bins even if the trash bins are outside the corporation.
(True/False)
4.8/5
(39)
Verification is the process where the verifier determines the identity of the supplicant.
(True/False)
4.9/5
(37)
Microsoft domains can be organized into trees, and trees can be organized into forests.
(True/False)
4.8/5
(37)
A ________ is a small device that plugs into a standard computer port to identify the owner.
(Multiple Choice)
4.8/5
(42)
Which of the following should be forbidden in secure areas?
(Multiple Choice)
4.8/5
(30)
________ can be used to supply power during long power outages.
(Multiple Choice)
4.9/5
(35)
Showing 21 - 40 of 124
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)