What should an organization do before providing an exte…
What should an organization do before providing an external agency physical access to its
information processing facilities (IPFs)?
Which of the following is the BEST way to satisfy a two…
Which of the following is the BEST way to satisfy a two-factor user authentication?
The MOST effective biometric control system is the one:
The MOST effective biometric control system is the one:
Which of the following physical access controls effecti…
Which of the following physical access controls effectively reduces the risk of piggybacking?
Which of the following is MOST important to protect the…
A data center has a badge-entry system. Which of the following is MOST important to protect the
computing assets in the center?
Which of the following is the MOST reliable form of sin…
Which of the following is the MOST reliable form of single factor personal identification?
The purpose of a deadman door controlling access to a c…
The purpose of a deadman door controlling access to a computer facility is primarily to:
The MOST likely explanation for a successful social eng…
The MOST likely explanation for a successful social engineering attack is:
Which of the following biometrics has the highest relia…
Which of the following biometrics has the highest reliability and lowest false-acceptance rate (FAR)?
A firm is considering using biometric fingerprint ident…
A firm is considering using biometric fingerprint identification on all PCs that access critical datA.
This requires: