All of the following are technical controls except:
All of the following are technical controls except:
what single sign-on technology?
Privilege Attribute Certificates (PACs) are used in what single sign-on technology?
what a user can access based on the data, not the subject’s identity, is called:
Determining what a user can access based on the data, not the subject’s identity, is called:
What type of solution should Doug implement?
Doug, the security officer, has been told by his manager that people should not be accessing the company’s servers during the weekend. What type of solution should Doug implement?
Which of the following administrative controls is not considered detective?
Which of the following administrative controls is not considered detective?
Which of the following is not a weakness of Kerberos?
Which of the following is not a weakness of Kerberos?
What issue could Jane be faced with?
Jane is responsible for rolling out her company’s IDS product. She has to make sure to place the IDS sensors in the correct location and ensure that the sensors are capturing data correctly. One of her engineers has told her that one network segment will require three sensors, but she is concerned because this will put her over her budget. What issue could Jane be faced with?
Which biometric mechanism identifies an individual by electrical signals that are emitted by a person’s
Which biometric mechanism identifies an individual by electrical signals that are emitted by a person’s physical movement?
What important variable is used when evaluating the effectiveness of biometric systems?
What important variable is used when evaluating the effectiveness of biometric systems?
What type of control is auditing?
What type of control is auditing?