which of the following attacks?
The use of residual biometric information to gain unauthorized access is an example of which of
the following attacks?
Which of the following is the MOST effective control ov…
Which of the following is the MOST effective control over visitor access to a data center?
The BEST overall quantitative measure of the performanc…
The BEST overall quantitative measure of the performance of biometric control devices is:
The MOST effective control for addressing the risk of p…
The MOST effective control for addressing the risk of piggybacking is:
Which of the following performance indicators is MOST i…
An organization with extremely high security requirements is evaluating the effectiveness of
biometric systems. Which of the following performance indicators is MOST important?
What is a risk associated with attempting to control ph…
What is a risk associated with attempting to control physical access to sensitive areas such as
computer rooms using card keys or locks?
An accuracy measure for a biometric system is:
An accuracy measure for a biometric system is:
During the review of a biometrics system operation, an …
During the review of a biometrics system operation, an IS auditor should FIRST review the stage
of:
Which of the following fire suppression systems is MOST…
Which of the following fire suppression systems is MOST appropriate to use in a data center
environment?
what is the MOST important rule to be included in a sec…
Users are issued security tokens to be used in combination with a PIN to access the corporate
virtual private network (VPN). Regarding the PIN, what is the MOST important rule to be included
in a security policy?