Loading questions...
Updated
Which of the following protects a password from eavesdroppers and supports the encryption of communication?
Which of the following exemplifies proper separation of duties?
Which of the following biometric devices offers the LOWEST CER?
Which of the following statements pertaining to access control is false?
Which of the following is not a logical control when implementing logical access security?
Which access control model is also called Non Discretionary Access Control (NDAC)?
What can be defined as a list of subjects along with their access rights that are authorized to access a specific object?
What is the difference between Access Control Lists (ACLs) and Capability Tables?
How are memory cards and smart cards different?
What is the main focus of the Bell-LaPadula security model?
What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
Smart cards are an example of which type of control?
What security model implies a central authority that define rules and sometimes global rules, dictating what subjects can have access to what objects?
Which of the following statements pertaining to biometrics is false?
Which of the following statements pertaining to Kerberos is TRUE?
Which of the following centralized access control mechanisms is the least appropriate for mobile workers accessing the corporate network over analog lines?
What refers to legitimate users accessing networked services that would normally be restricted to them?
Which of the following is not a two-factor authentication mechanism?
Which of the following access control models requires defining classification for objects?
Which of the following statements pertaining to using Kerberos without any extension is false?
Which of the following statements pertaining to Kerberos is false?
Which of the following is an example of discretionary access control?
Which of the following is NOT an advantage that TACACS+ has over TACACS?
A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:
A confidential number used as an authentication factor to verify a user's identity is called a: