An authentication system relies on an RFID chip embedded in a plastic key together with the pattern of blood vessels in the back of an authorized user's hand. What types of authentication are being employed in this system?
a. Something you have and something you are
b. Something you do and something you know
c. Something you know and something you are
d. Somewhere you are and something you have
Lynn needs access to the Accounting order-entry application but keeps getting an error that indicates inadequate access permissions. Bob assigns Lynn's account to the Administrator's group to overcome the error until he can work on the problem. Which access control constraint was violated by this action?
a. Implicit denial
b. Least privilege
c. Separation of duties
d. Account expiration
An organization that relies heavily on cloud and SaaS service providers, such as Salesforce.com, WebEx, and Google, would have security concerns when implementing which of the following?
Which of the following are steps that can be taken to harden DHCP services?
a. Anonymous access to share files of questionable or undesirable content should be limited.
b. Regular review of networks for unauthorized or rogue servers.
c. Technologies that allow dynamic updates must also include access control and authentication.
d. Unauthorized zone transfers should also be restricted.
The sender of data is provided with proof of delivery, and neither the sender nor receiver can deny either having sent or received the data. What is this called?
a. Nonrepudiation
b. Repetition
c. Nonrepetition
d. Repudiation