The purpose of a deadman door controlling access to a c…
The purpose of a deadman door controlling access to a computer facility is primarily to:
The MOST likely explanation for a successful social eng…
The MOST likely explanation for a successful social engineering attack is:
Which of the following biometrics has the highest relia…
Which of the following biometrics has the highest reliability and lowest false-acceptance rate (FAR)?
A firm is considering using biometric fingerprint ident…
A firm is considering using biometric fingerprint identification on all PCs that access critical datA.
This requires:
which of the following attacks?
The use of residual biometric information to gain unauthorized access is an example of which of
the following attacks?
Which of the following is the MOST effective control ov…
Which of the following is the MOST effective control over visitor access to a data center?
The BEST overall quantitative measure of the performanc…
The BEST overall quantitative measure of the performance of biometric control devices is:
The MOST effective control for addressing the risk of p…
The MOST effective control for addressing the risk of piggybacking is:
Which of the following performance indicators is MOST i…
An organization with extremely high security requirements is evaluating the effectiveness of
biometric systems. Which of the following performance indicators is MOST important?
What is a risk associated with attempting to control ph…
What is a risk associated with attempting to control physical access to sensitive areas such as
computer rooms using card keys or locks?