You plan to install smart card readers. smart cards have the ability to encrypt access information12/11/2022 ![]() The Internet? Plan for considering proper authentication options.ġ3-Kerberos can prevent which one of the following attacks? Playback (replay) attack.ġ4-In discretionary access environments, which of the following entities is authorized to grant information access to other people?ġ5-What is the main concern with single sign-on? Maximum unauthorized access would be possible if a password is disclosed.ġ6-Who developed one of the first mathematical models of a multilevel-security computer system? Bell and LaPadula.ġ7-Which of the following attacks could capture network user passwords? Sniffingġ8-Which of the following would constitute the best example of a password to use for access to a system by a network administrator?ġ9-What physical characteristic does a retinal scan biometric device measure? The pattern of blood vessels at the back of the eyeĢ0-The Computer Security Policy Model the Orange Book is based on is which of the following? Bell-LaPadulaĢ1-The end result of implementing the principle of least privilege means which of the following? ĥ-What is Kerberos? a trusted third-party authentication protocol.Ħ-Kerberos depends upon what encryption method? Secret key cryptography.ħ-A confidential number used as an authentication factor to verify a user’s identity is called a: PINĨ-Individual accountability does not include which of the following? policies & proceduresĩ-Which of the following exemplifies proper separation of duties? Operators are not permitted modify the system time.ġ0-An access control policy for a bank teller is an example of the implementation of which of the following? Role-based policyġ1-Which one of the following authentication mechanisms creates a problem for mobile users? Mechanisms based on IP addressesġ2-Organizations should consider which of the following first before allowing external access to their LANs via ![]() The item’s classification and category setģ-Which of the following is true about Kerberos? It depends on symmetric ciphers,Ĥ-Which of the following is needed for System Accountability? Audit mechanisms. Create a FREE account here to get access and download this file with answersġ-a potential problem related to the physical installation of the Iris Scanner in regard so the usage of the iris pattern within a biometric system is: the optical unit must be positioned so that the sun does not shine into the aperture.Ģ-In Mandatory Access Control, sensitivity labels attached to object contain what information?
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |