Which of the following BEST describes using a smart car…
Which of the following BEST describes using a smart card and typing in a PIN to gain access to a system?
Speaking a passphrase into a voice print analyzer is an…
Speaking a passphrase into a voice print analyzer is an example of the following security concepts:
One of the most basic ways to protect the confidentiali…
One of the most basic ways to protect the confidentiality of data on a laptop in the event the device is physically
stolen is to implement the following:
Which of the following types of authentication is being…
A company requires that a user’s credentials include providing something they know and something they are in
order to gain access to the network. Which of the following types of authentication is being described?
How many authentication factors are in use by the VPN s…
A company with a US-based sales force has requested that the VPN system be configured to authenticate the
sales team based on their username, password and a client side certificate.
Additionally, the security administrator has restricted the VPN to only allow authentication from the US territory.
How many authentication factors are in use by the VPN system?
Which of the following protocols provides for mutual au…
Which of the following protocols provides for mutual authentication of the client and server?
Which of the following is an example of multifactor aut…
Which of the following is an example of multifactor authentication?
Which of the following should be implemented during the…
A technician wants to implement a dual factor authentication system that will enable the organization to
authorize access to sensitive systems on a need-to-know basis. Which of the following should be implemented
during the authorization stage?
Which of the following would fulfill the CISO’s require…
A Chief Information Security Officer (CISO) wants to implement two-factor authentication within the company.
Which of the following would fulfill the CISO’s requirements?
Which of the following describes this access control type?
Employee badges are encoded with a private encryption key and specific personal information.
The encoding is then used to provide access to the network. Which of the following describes this access
control type?