Exam 5: Access Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The verifier itself determines the identity of the supplicant in ________.

(Multiple Choice)
4.8/5
(34)

A firm can be its own certificate authority for internal users.

(True/False)
4.8/5
(38)

In military security, SBU documents are unclassified.

(True/False)
4.9/5
(35)

If Directory Server A trusts Directory Server B and Directory Server B trusts Directory Server C then Directory Server A MUST trust Directory Server C.

(True/False)
4.9/5
(37)

A ________ does not require a special reader to be added to a PC for access control.

(Multiple Choice)
4.8/5
(36)

In the context of PKI, ________ is the process of accepting public keys and providing new digital certificates to the users.

(Multiple Choice)
5.0/5
(43)

Because fingerprint scanning is often deceived, it should never be used as a security measure.

(True/False)
4.8/5
(39)

Which of the following is true?

(Multiple Choice)
4.8/5
(31)

Hand geometry recognition is used heavily for ________.

(Multiple Choice)
4.8/5
(29)

In Kerberos, the Kerberos server sends the Service Ticket directly to the supplicant rather than directly to the verifier.

(True/False)
4.8/5
(33)

A ________ card is an access card that has a built-in microprocessor and memory.

(Multiple Choice)
4.9/5
(46)

Which of the following statements accurately describes iris recognition?

(Multiple Choice)
5.0/5
(44)

XML makes SAML platform-dependent.

(True/False)
4.9/5
(36)

Which of the following is not one of the AAA controls?

(Multiple Choice)
4.8/5
(31)

In directory servers, information is organized ________.

(Multiple Choice)
4.8/5
(30)

Two-factor authentication can be defeated if ________.

(Multiple Choice)
4.8/5
(42)

In Kerberos, the ________ is sent from the Kerberos server to the supplicant.

(Multiple Choice)
4.8/5
(34)

In federated identity management, firms do not query one another's identity management databases.

(True/False)
4.9/5
(31)

Passwords offer reasonable security at reasonable cost and will likely continue to increase in importance in the future.

(True/False)
4.8/5
(35)

A false acceptance occurs when a person is improperly matched to a template.

(True/False)
4.8/5
(42)
Showing 81 - 100 of 124
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)