An authentication system relies on an RFID chip embedded in a plastic key together with the pattern of blood vessels in the back of an authorized user's hand. What types of authentication are being employed in this system?

An authentication system relies on an RFID chip embedded in a plastic key together with the pattern of blood vessels in the back of an authorized user's hand. What types of authentication are being employed in this system?



a. Something you have and something you are
b. Something you do and something you know
c. Something you know and something you are
d. Somewhere you are and something you have




Answer: A

Lynn needs access to the Accounting order-entry application but keeps getting an error that indicates inadequate access permissions. Bob assigns Lynn's account to the Administrator's group to overcome the error until he can work on the problem. Which access control constraint was violated by this action?

Lynn needs access to the Accounting order-entry application but keeps getting an error that indicates inadequate access permissions. Bob assigns Lynn's account to the Administrator's group to overcome the error until he can work on the problem. Which access control constraint was violated by this action?



a. Implicit denial
b. Least privilege
c. Separation of duties
d. Account expiration



Answer: B

Which of the following are steps that can be taken to harden DHCP services?

Which of the following are steps that can be taken to harden DHCP services?



a. Anonymous access to share files of questionable or undesirable content should be limited.
b. Regular review of networks for unauthorized or rogue servers.
c. Technologies that allow dynamic updates must also include access control and authentication.
d. Unauthorized zone transfers should also be restricted.




Answer: B