(Choose four)
Threat assessment has four major components, name them. (Choose four)
A systems ability to identify a particular individual, track their actions, and monitor their behavior is know
A systems ability to identify a particular individual, track their actions, and monitor their behavior is
known as:
To meet SSCP certification requirements a candidate must _______ and __________.<br>(Choose two)
To meet SSCP certification requirements a candidate must _______ and
__________.<br>(Choose two)
_________ is the act of a user professing an identity to a system.
_________ is the act of a user professing an identity to a system.
_______ and ________ are the primary controls of most access control systems.<br>(Choose two)
_______ and ________ are the primary controls of most access control systems.<br>(Choose
two)
Authentication is based on which of the following:<br>(Choose three)
Authentication is based on which of the following:<br>(Choose three)
________refers to the act of requiring more than on type of authentication to be used and is considered more s
________ ___________ refers to the act of requiring more than on type of authentication to be
used and is considered more secure than any single type of authentication.<br> (Choose two)
What system allows a user to provide one ID and password per work session and then is automatically logged-on
What system allows a user to provide one ID and password per work session and then is
automatically logged-on to all the required applications?
Name three SSO types?
Name three SSO types? (Choose three)
Kerberos uses asymmetric encryption.(True / False)
Kerberos uses asymmetric encryption.(True / False)