Fact or opinion-based passwords are referred to as:
Fact or opinion-based passwords are referred to as:
What type of threat is his security officer concerned with?
Larry is in a management role within his organization. He has to decide on the type of information that will be collected and maintained about their customers. His security officer has warned him about obtaining combinations of data such as driver’s license numbers and addresses. What type of threat is his security officer concerned with?
Which of the following is UNTRUE of a database directory based on the X.500 standard?
Which of the following is UNTRUE of a database directory based on the X.500 standard?
What is the difference between a session and a permanent cookie?
What is the difference between a session and a permanent cookie?
What type of technology does Joe need toimplement for this type of functionality?
Joe is a manager over the e-commerce capabilities and technologies within hiscompany. His boss has recently told him that the company is going to partner withanother company and that customer entitlements need to be able to transparentlytransverse the different networks. What type of technology does Joe need toimplement for this type of functionality?
Which of the following biometric technologies is considered the most accurate?
Which of the following biometric technologies is considered the most accurate?
Which of the following has the correct definition mapping?
Which of the following has the correct definition mapping?
i.Brute force attacks Performed with tools that cycle through many possiblecharacter, number, and symbol combinations to uncover a password.
ii. Dictionary attacks Files of thousands of words are compared to the user’spassword until a match is found.
iii. Social engineering An attacker falsely convinces an individual that she has thenecessary authorization to access specific resources.
iv. Rainbow table An attacker uses a table that contains all possible passwordsalready in a hash format.
Whatsolution should he offer his team to implement?
Joe is the manager of the network administration group. He has been told thatone of the systems working in dedicated security mode has been configured to allowsensitive information to pass to a system working in multilevel security mode. Whatsolution should he offer his team to implement?
Which of the following should Bob choseto implement?
Bob needs to implement role-based access control (RBAC) within his company. Hehas learned that there are several approaches to RBAC. He needs to ensure that usersPage 2cess trol-P5.txtare mapped to multiple roles and mapped directly to other types of applications thatdo not have role-based access functionality. Which of the following should Bob choseto implement?
What type of access control does this refer to?
Dan is a senior manager within the security department of his company. He needsto make a purchasing decision of the type of access control products that should beimplemented. The product that is purchased needs to ensure that managers can accessa portion of a file or folder, but not others. What type of access control does this refer to?