Exam 5: Access Control
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
Giving a user permissions to use a certain resource is ________.
(Multiple Choice)
4.9/5
(51)
Identification requires more matches against templates than does verification.
(True/False)
4.8/5
(34)
In biometric, a match occurs when a ________ meets the decision criteria.
(Multiple Choice)
4.9/5
(37)
From a security viewpoint, a false acceptance is always worse than a false rejection.
(True/False)
4.9/5
(49)
The main standards used by firms to send security assertions to one another is LDAP.
(True/False)
4.8/5
(47)
Users should select very long and complex passwords and use the same password at all sites for auditability.
(True/False)
4.8/5
(39)
In Kerberos, the ________ is an encrypted session key that only the verifier can decrypt.
(Multiple Choice)
4.7/5
(35)
In Active Directory, a domain controller contains ________.
(Multiple Choice)
4.7/5
(38)
Which of the following statements accurately describes fingerprint recognition?
(Multiple Choice)
4.8/5
(38)
A(n) ________ is a statement from Firm A that Firm B should accept as true if Firm B trusts Firm A.
(Multiple Choice)
4.9/5
(39)
The template is based on ________ generated during the enrollment scan.
(Multiple Choice)
4.9/5
(27)
A private key/public key pair is usually created by the ________.
(Multiple Choice)
4.7/5
(27)
Which of the following is not one of the rules for working in secure areas?
(Multiple Choice)
4.8/5
(33)
When assigning initial permissions, it is good to add more permissions than strictly necessary and then remove permissions if appropriate.
(True/False)
4.8/5
(38)
Fingerprint recognition should be used as a security measure for access to ________.
(Multiple Choice)
4.8/5
(35)
Self-service identity management should be used to change a ________ in the identity database.
(Multiple Choice)
4.8/5
(35)
The principle of ________ states that each person should only get the permissions that he or she absolutely needs to do his or her job.
(Multiple Choice)
4.8/5
(36)
Showing 41 - 60 of 124
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)