How many authentication factors are in use by the VPN system?
A company with a US-based sales force has requested that the VPN system be configured to authenticate
the sales team based on their username, password and a client side certificate.
Additionally, the security administrator has restricted the VPN to only allow authentication from the US
territory. How many authentication factors are in use by the VPN system?
Which of the following types of authentication is being described?
A company requires that a user’s credentials include providing something they know and something they
are in order to gain access to the network. Which of the following types of authentication is being
described?
which of the following?
One of the most basic ways to protect the confidentiality of data on a laptop in the event the device is
physically stolen is to implement which of the following?
which of the following security concepts?
Speaking a passphrase into a voice print analyzer is an example of which of the following security
concepts?
Which of the following BEST describes using a smart card and typing in a PIN to gain access to a system?
Which of the following BEST describes using a smart card and typing in a PIN to gain access to a system?
Which of the following type of authentication mechanism is this?
An organization has introduced token-based authentication to system administrators due to risk of
password compromise. The tokens have a set of numbers that automatically change every 30 seconds.
Which of the following type of authentication mechanism is this?
Which of the following should the security technician recommend?
A security technician has been asked to recommend an authentication mechanism that will allow users to
authenticate using a password that will only be valid for a predefined time interval. Which of the
following should the security technician recommend?
which of the following?
LDAP and Kerberos are commonly used for which of the following?
Which of the following is being described?
After Ann, a user, logs into her banking websites she has access to her financial institution mortgage,
credit card, and brokerage websites as well. Which of the following is being described?
Which of the following would accomplish this?
A company wants to ensure that all credentials for various systems are saved within a central database so
that users only have to login once for access to all systems. Which of the following would accomplish this?