Which of the following is not an example of a preventive physical access control?
Which of the following is not an example of a preventive physical access control?
What is another name for a dynamic password?
What is another name for a dynamic password?
what type of access control administration?
TACACS+ provides what type of access control administration?
Fact or opinion-based passwords are referred to as:
Fact or opinion-based passwords are referred to as:
What type of threat is his security officer concerned with?
Larry is in a management role within his organization. He has to decide on the type of information that will be collected and maintained about their customers. His security officer has warned him about obtaining combinations of data such as driver’s license numbers and addresses. What type of threat is his security officer concerned with?
Which of the following is UNTRUE of a database directory based on the X.500 standard?
Which of the following is UNTRUE of a database directory based on the X.500 standard?
What is the difference between a session and a permanent cookie?
What is the difference between a session and a permanent cookie?
What type of technology does Joe need toimplement for this type of functionality?
Joe is a manager over the e-commerce capabilities and technologies within hiscompany. His boss has recently told him that the company is going to partner withanother company and that customer entitlements need to be able to transparentlytransverse the different networks. What type of technology does Joe need toimplement for this type of functionality?
Which of the following biometric technologies is considered the most accurate?
Which of the following biometric technologies is considered the most accurate?
Which of the following has the correct definition mapping?
Which of the following has the correct definition mapping?
i.Brute force attacks Performed with tools that cycle through many possiblecharacter, number, and symbol combinations to uncover a password.
ii. Dictionary attacks Files of thousands of words are compared to the user’spassword until a match is found.
iii. Social engineering An attacker falsely convinces an individual that she has thenecessary authorization to access specific resources.
iv. Rainbow table An attacker uses a table that contains all possible passwordsalready in a hash format.