Exam 5: Access Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If Directory Server A trusts Directory Server B, Directory Server B trusts Directory Server C, and Directory Server A trusts Directory Server C, this is ________ trust.

(Multiple Choice)
4.9/5
(32)

The most widely used form of biometrics is ________.

(Multiple Choice)
4.8/5
(39)

A false rejection occurs when a person is improperly matched to a template.

(True/False)
4.8/5
(46)

In Kerberos, the verifier is explicitly notified that the supplicant has been authenticated.

(True/False)
4.8/5
(24)

Which of the following are benefits of using identity management?

(Multiple Choice)
4.9/5
(36)

In high-risk environments, password reset risks are reduced by requiring the user's physical presence.

(True/False)
4.8/5
(33)

The standard for sending security assertions is ________.

(Multiple Choice)
4.8/5
(40)

Directory servers from different vendors are synchronized through ________.

(Multiple Choice)
4.9/5
(28)

When an attacker deliberately attempts to fool the system, this is called ________.

(Multiple Choice)
4.9/5
(40)

________ often get their authentication information from ________.

(Multiple Choice)
4.9/5
(26)

If Directory Server A trusts Directory Server Band Directory Server B trusts Directory Server A, this is ________ trust.

(Multiple Choice)
4.9/5
(34)

The book recommends that passwords be at least ________ characters long.

(Multiple Choice)
4.7/5
(29)

________ servers synchronize directory servers from different vendors.

(Multiple Choice)
4.8/5
(39)

It is very important for testers to get permission before running a password cracking program on their company's computers to check for weak passwords even if such testing is in their job definitions.

(True/False)
4.7/5
(47)

Long passwords that use several types of keyboard characters are called ________ passwords.

(Multiple Choice)
4.8/5
(43)

When assigning initial permissions, it is good to give the least permissions believed to be necessary and then add permissions if appropriate.

(True/False)
4.8/5
(35)

If a firewall lacks the processing power to handle incoming traffic, it will drop any packets it cannot process. This is ________.

(Multiple Choice)
4.8/5
(35)

A security assertion may contain ________.

(Multiple Choice)
4.8/5
(40)

________ is the process of assessing the identity of each individual claiming to have permission to use a resource.

(Multiple Choice)
4.8/5
(34)

A ________ is a small device with a display that has a number that changes frequently.

(Multiple Choice)
5.0/5
(41)
Showing 61 - 80 of 124
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)