Filters
Question type

Study Flashcards

Which of the following should be forbidden in secure areas?


A) Cameras
B) USB flash drives
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

In directory servers, ________.


A) there can only be one O in a directory server
B) there can only be one OU in a directory server
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

A Microsoft domain can have multiple domain controllers.

Correct Answer

verifed

verified

________ can be used to supply power during long power outages.


A) Uninterruptable power supplies
B) Electrical generators
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Verification is the process where the verifier determines the identity of the supplicant.

Correct Answer

verifed

verified

________ is a social engineering trick where an intruder may follow an authorized user through a door that the authorized user opens with an access device.


A) Shoulder surfing
B) Shadowing
C) Trailing
D) Piggybacking

Correct Answer

verifed

verified

________ is possible today.


A) Single sign-on
B) Reduced sign-on
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

In the military, departments do not have the ability to alter access control rules set by higher authorities in ________.


A) policy-based access control
B) mandatory access control
C) discretionary access control
D) multilevel access control

Correct Answer

verifed

verified

CAs distribute public keys ________.


A) in digital certificates
B) only in ways using encryption for confidentiality
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Microsoft domains can be organized into trees, and trees can be organized into forests.

Correct Answer

verifed

verified

Authentication is the process of collecting information about the activities of each individual in log files for immediate and later analysis.

Correct Answer

verifed

verified

A(n) ________ is the set of attributes about a person or resource that must be revealed in a particular context.


A) template
B) subtemplate
C) identity
D) None of the above

Correct Answer

verifed

verified

________ is the centralized policy based management of all information required for access to corporate systems by people, machines, programs, or other resources.


A) Directory service
B) Meta-directory service
C) Identity management
D) Meta-identity management

Correct Answer

verifed

verified

Passwords should be changed frequently.

Correct Answer

verifed

verified

Most users who have access to servers use reusable passwords for authentication.

Correct Answer

verifed

verified

Which of the following is one of the four bases for authentication credentials?


A) What you know
B) What you have
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

It is illegal to go through a company's trash bins even if the trash bins are outside the corporation.

Correct Answer

verifed

verified

For watch lists of criminals, a false acceptance is worse than a false rejection from a security viewpoint.

Correct Answer

verifed

verified

A ________ is a small device that plugs into a standard computer port to identify the owner.


A) one-time-password token
B) USB token
C) magnetic stripe card
D) smart card

Correct Answer

verifed

verified

Authorizations are also called ________.


A) permissions
B) verifications
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Showing 21 - 40 of 124

Related Exams

Show Answer