Which of thefollowing is not true pertaining to the permissions that can be granted?
Windows and most Linux and Unix systems are based on the DAC model. Which of thefollowing is not true pertaining to the permissions that can be granted?
What type of access control is being used?
An online banking program may allow a customer to view his account balance, butmay not allow the customer to transfer money until he has a certain security levelor access right. What type of access control is being used?
which of the following would be the best model to use?
Acme has the choice of rolling out products that are based on DAC, MAC, orRBAC models. Their security policy indicates that authentication will be identitybased, so which of the following would be the best model to use?
What exactly are soft tokens?
Paul has been asked to evaluate implementing soft tokens across the enterprise.What exactly are soft tokens?
Which of the following is not a characteristic of a counter-based token device?
Which of the following is not a characteristic of a counter-based token device?
Which of the followingis a true statement pertaining to the use of salts?
Unix and Linux systems use salts when storing passwords. Which of the followingis a true statement pertaining to the use of salts?