Exam 5: Access Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If a laptop needs to be taken off premises, ________.

(Multiple Choice)
4.7/5
(44)

Giving a user permissions to use a certain resource is ________.

(Multiple Choice)
4.9/5
(51)

Iris scanning usually is done surreptitiously.

(True/False)
4.8/5
(44)

Identification requires more matches against templates than does verification.

(True/False)
4.8/5
(34)

In biometric, a match occurs when a ________ meets the decision criteria.

(Multiple Choice)
4.9/5
(37)

From a security viewpoint, a false acceptance is always worse than a false rejection.

(True/False)
4.9/5
(49)

The main standards used by firms to send security assertions to one another is LDAP.

(True/False)
4.8/5
(47)

Users should select very long and complex passwords and use the same password at all sites for auditability.

(True/False)
4.8/5
(39)

In Kerberos, the ________ is an encrypted session key that only the verifier can decrypt.

(Multiple Choice)
4.7/5
(35)

In federated identity management, firms ________.

(Multiple Choice)
4.7/5
(44)

In Active Directory, a domain controller contains ________.

(Multiple Choice)
4.7/5
(38)

Which of the following statements accurately describes fingerprint recognition?

(Multiple Choice)
4.8/5
(38)

A(n) ________ is a statement from Firm A that Firm B should accept as true if Firm B trusts Firm A.

(Multiple Choice)
4.9/5
(39)

The template is based on ________ generated during the enrollment scan.

(Multiple Choice)
4.9/5
(27)

A private key/public key pair is usually created by the ________.

(Multiple Choice)
4.7/5
(27)

Which of the following is not one of the rules for working in secure areas?

(Multiple Choice)
4.8/5
(33)

When assigning initial permissions, it is good to add more permissions than strictly necessary and then remove permissions if appropriate.

(True/False)
4.8/5
(38)

Fingerprint recognition should be used as a security measure for access to ________.

(Multiple Choice)
4.8/5
(35)

Self-service identity management should be used to change a ________ in the identity database.

(Multiple Choice)
4.8/5
(35)

The principle of ________ states that each person should only get the permissions that he or she absolutely needs to do his or her job.

(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 124
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)