Which of the following choices is not a two-factor authentication?
Which of the following choices is not a two-factor authentication?
What is the main drawback to using single sign-on?
What is the main drawback to using single sign-on?
Which of the following would be a reason for employing this type of technology?
Steven’s staff has asked for funding to implement technology that provides MobileIP. Which of the following would be a reason for employing this type of technology?
which one requires defining classification for objects?
Of the following access control models, which one requires defining classification for objects?
Password management could be classified as a:
Password management could be classified as a:
What type of control should Jacklook at implementing?
Jack has submitted his physical security program solutions to management for approval. One of the responses to his submission was that the company could notafford to employ security guards as he recommended. What type of control should Jacklook at implementing?
Which of the following does not describe a synchronous token device?
Which of the following does not describe a synchronous token device?
Which of the following is not used to control the “leakage” of electrical signals?
Which of the following is not used to control the "leakage" of electrical signals?
Which of the following is not included in the classic ways of authenticating auser?
Which of the following is not included in the classic ways of authenticating auser?
Which of the following is least important to be included on a log that captures security violations?
Which of the following is least important to be included on a log that captures security violations?