Which provides the best authentication?
Which provides the best authentication?
Which access control method is user-directed?
Which access control method is user-directed?
What type of activity could this indicate?
John has noticed some unusual activities in his company’s logs. There have beenseveral outgoing authentication attempts in the format of "www.msn.com@notmsn.com".What type of activity could this indicate?
How is a challenge-response protocol utilized with token implementations?
How is a challenge-response protocol utilized with token implementations?
Which access control policy is enforced when an environment uses groups?
Which access control policy is enforced when an environment uses groups?
An access control model should work mainly in a _________ manner.
An access control model should work mainly in a _________ manner.
Which of the following is not a logical access control?
Which of the following is not a logical access control?
Which of the following controls should Sarahensure that her team implements?
Sarah is the security officer for her organization and must be concerned aboutthe many types of threats that exist. She has been told that there have beenattempts by external entities to access resources in an unauthorized manner throughthe organization’s legacy modems. Which of the following controls should Sarahensure that her team implements?
i.Perform brute force war dialing attacks to find weaknesses and hanging modems.
ii. Make sure only necessary phone numbers are made public.
iii. Provide stringent access control methods that would make brute force attacks less successful.
iv. Set lockout thresholds.
What is the reason for enforcing the separation of duties?
What is the reason for enforcing the separation of duties?
Which of the following statements correctly describes passwords?
Which of the following statements correctly describes passwords?