Which of the following is a commonly applied principle for fault tolerance against accidental faults designed into critical facilities planning?
a....
An authentication system relies on an RFID chip embedded in a plastic key together with the pattern of blood vessels in the back of an authorized user's hand. What types of authentication are being employed in this system?
An authentication system relies on an RFID chip embedded in a plastic key together with the pattern of blood vessels in the back of an authorized user's...
Lynn needs access to the Accounting order-entry application but keeps getting an error that indicates inadequate access permissions. Bob assigns Lynn's account to the Administrator's group to overcome the error until he can work on the problem. Which access control constraint was violated by this action?
Lynn needs access to the Accounting order-entry application but keeps getting an error that indicates inadequate access permissions. Bob assigns Lynn's...
Which of the following standards ensures privacy between communicating applications and clients on the Web and has been designed to replace SSL?
Which of the following standards ensures privacy between communicating applications and clients on the Web and has been designed to replace SSL?
a....
In which of the following types of architecture is the user responsible for the creation of the private and public key?
In which of the following types of architecture is the user responsible for the creation of the private and public key?
a. Decentralized key management
b....
An organization that relies heavily on cloud and SaaS service providers, such as Salesforce.com, WebEx, and Google, would have security concerns when implementing which of the following?
An organization that relies heavily on cloud and SaaS service providers, such as Salesforce.com, WebEx, and Google, would have security concerns when...
Which type of biometric authentication involves identification of the unique patterns of blood-vessels at the back of the eye?
Which type of biometric authentication involves identification of the unique patterns of blood-vessels at the back of the eye?
a. Facial recognition
b....
Which type of authorization provides a mechanism for validation of both sender and receiver?
Which type of authorization provides a mechanism for validation of both sender and receiver?
a. Anonymous
b. Kerberos
c. TACACS
d. RADIUS
Answer:...
Which of the fields included within a digital certificate identifies the directory name of the entity signing the certificate?
Which of the fields included within a digital certificate identifies the directory name of the entity signing the certificate?
a. Signature algorithm...
Which of the following are steps that can be taken to harden DHCP services?
Which of the following are steps that can be taken to harden DHCP services?
a. Anonymous access to share files of questionable or undesirable content...
The sender of data is provided with proof of delivery, and neither the sender nor receiver can deny either having sent or received the data. What is this called?
The sender of data is provided with proof of delivery, and neither the sender nor receiver can deny either having sent or received the data. What is...
Which of the following is an example of role-based access control criteria?
Which of the following is an example of role-based access control criteria?
a. GPS coordinates
b. Trusted OS
c. Members of the Administrators group
d....
Which of the following is not an example of multifactor authentication?
Which of the following is not an example of multifactor authentication?
a. Logon and password
b. Smart card and PIN
c. RFID chip and thumbprint
d....
Which of the following provides a clear record of the path evidence takes from acquisition to disposal?
Which of the following provides a clear record of the path evidence takes from acquisition to disposal?
a. Video capture
b. Chain of custody
c. Hashes
d....
Subscribe to:
Posts (Atom)