Filters
Question type

Study Flashcards

When an attacker deliberately attempts to fool the system, this is called ________.


A) deception
B) a false acceptance
C) a false rejection
D) All of the above.

Correct Answer

verifed

verified

The book recommends that passwords be at least ________ characters long.


A) 6
B) 8
C) 20
D) 100

Correct Answer

verifed

verified

Which of the following are benefits of using identity management?


A) Reduced costs
B) Centralized auditing of all an employee's access permission across a firm
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

It is very important for testers to get permission before running a password cracking program on their company's computers to check for weak passwords even if such testing is in their job definitions.

Correct Answer

verifed

verified

Directory servers from different vendors are synchronized through ________.


A) LDAP
B) central authentication servers
C) AD servers
D) None of the above

Correct Answer

verifed

verified

If Directory Server A trusts Directory Server B, Directory Server B trusts Directory Server C, and Directory Server A trusts Directory Server C, this is ________ trust.


A) Mutual
B) One-way
C) Transitive
D) Intransitive

Correct Answer

verifed

verified

If a firewall lacks the processing power to handle incoming traffic, it will drop any packets it cannot process. This is ________.


A) a security failure
B) failing safely
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

In high-risk environments, password reset risks are reduced by requiring the user's physical presence.

Correct Answer

verifed

verified

________ often get their authentication information from ________.


A) Directory servers, central authentication servers
B) Central authentication servers, metadirectory servers
C) Central authentication servers, directory servers
D) Metadirectory servers, central authentication servers

Correct Answer

verifed

verified

________ servers synchronize directory servers from different vendors.


A) Synchronization
B) LDAP
C) Metadirectory
D) Central authentication

Correct Answer

verifed

verified

The standard for sending security assertions is ________.


A) LDAP
B) XML
C) SAML
D) None of the above

Correct Answer

verifed

verified

In Kerberos, the verifier is explicitly notified that the supplicant has been authenticated.

Correct Answer

verifed

verified

________ is the process of assessing the identity of each individual claiming to have permission to use a resource.


A) Authorizations
B) Authentication
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

When assigning initial permissions, it is good to give the least permissions believed to be necessary and then add permissions if appropriate.

Correct Answer

verifed

verified

The most widely used form of biometrics is ________.


A) retinal scanning
B) iris scanning
C) fingerprint scanning
D) face recognition

Correct Answer

verifed

verified

A false rejection occurs when a person is improperly matched to a template.

Correct Answer

verifed

verified

A security assertion may contain ________.


A) authenticity information
B) attributes, such as spending limits for purchasers
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

A ________ is a small device with a display that has a number that changes frequently.


A) one-time-password token
B) USB token
C) magnetic stripe card
D) None of the above

Correct Answer

verifed

verified

If Directory Server A trusts Directory Server Band Directory Server B trusts Directory Server A, this is ________ trust.


A) Mutual
B) One-way
C) Transitive
D) Intransitive

Correct Answer

verifed

verified

Long passwords that use several types of keyboard characters are called ________ passwords.


A) complex
B) reusable
C) dictionary
D) one-time

Correct Answer

verifed

verified

Showing 61 - 80 of 124

Related Exams

Show Answer