Which of the following is the BEST way to satisfy a two-factor user authentication?
Which of the following is the BEST way to satisfy a two-factor user authentication?
The MOST effective biometric control system is the one:
The MOST effective biometric control system is the one:
Which of the following physical access controls effectively reduces the risk of piggybacking?
Which of the following physical access controls effectively reduces the risk of piggybacking?
Which of the following is MOST important to protect the computing assets in the center?
A data center has a badge-entry system. Which of the following is MOST important to protect the computing assets in the center?
Which of the following is the MOST reliable form of single factor personal identification?
Which of the following is the MOST reliable form of single factor personal identification?
The purpose of a deadman door controlling access to a computer facility is primarily to:
The purpose of a deadman door controlling access to a computer facility is primarily to:
The MOST likely explanation for a successful social engineering attack is:
The MOST likely explanation for a successful social engineering attack is:
Which of the following biometrics has the highest reliability and lowest false-acceptance rate (FAR)?
Which of the following biometrics has the highest reliability and lowest false-acceptance rate (FAR)?
This requires:
A firm is considering using biometric fingerprint identification on all PCs that access critical datA.
This requires:
The use of residual biometric information to gain unauthorized access is an example of which of the following
The use of residual biometric information to gain unauthorized access is an example of which of the following attacks?