How is a challenge-response protocol utilized with token implementations?
How is a challenge-response protocol utilized with token implementations?
Which access control policy is enforced when an environment uses groups?
Which access control policy is enforced when an environment uses groups?
An access control model should work mainly in a _________ manner.
An access control model should work mainly in a _________ manner.
Which of the following is not a logical access control?
Which of the following is not a logical access control?
Which of the following controls should Sarahensure that her team implements?
Sarah is the security officer for her organization and must be concerned aboutthe many types of threats that exist. She has been told that there have beenattempts by external entities to access resources in an unauthorized manner throughthe organization’s legacy modems. Which of the following controls should Sarahensure that her team implements?
i.Perform brute force war dialing attacks to find weaknesses and hanging modems.
ii. Make sure only necessary phone numbers are made public.
iii. Provide stringent access control methods that would make brute force attacks less successful.
iv. Set lockout thresholds.
What is the reason for enforcing the separation of duties?
What is the reason for enforcing the separation of duties?
Which of the following statements correctly describes passwords?
Which of the following statements correctly describes passwords?
What is derived from a passphrase?
What is derived from a passphrase?
Which of the following statements correctly describes biometric methods?
Which of the following statements correctly describes biometric methods?
What technology should Tom implement within hisenvironment?
Tom needs a AAA solution that ensures that he does not need to maintain a remoteaccess server database of remote user credentials and a database within ActiveDirectory for local users. What technology should Tom implement within hisenvironment?