Which of the following reduces help-desk call volume, but is also criticized for the ease with which a hacker
There are several types of password management approaches used by identity management systems. Which of the following reduces help-desk call volume, but is also criticized for the ease with which a hacker could gain access to multiple resources if a password is compromised?
What is the best description for what WAM is commonly used for?
Hannah has been assigned the task of installing Web access management (WAM) software. What is the best description for what WAM is commonly used for?
Which of the following does not correctly describe a directory service?
Which of the following does not correctly describe a directory service?
Which of the following is incorrect when considering privilege management?
Which of the following is incorrect when considering privilege management?
A disadvantage of single sign-on is…
A disadvantage of single sign-on is
Identity management is…
Identity management is
Role-based access control…
Role-based access control .
Which is a fundamental disadvantage of biometrics?
Which is a fundamental disadvantage of biometrics?
Which is the least significant issue when considering biometrics?
Which is the least significant issue when considering biometrics?
In mandatory access control the system controls access and the owner determines…
In mandatory access control the system controls access and the owner determines
