Give us your feedback!
Question:
Biometric authentication is most often hampered by:
Response:
Initial Registration
Cost to implement
Rings/Weight change
User acceptance
Which of the following is not a typical layer 1 topology?
star
ring
2 layer star
bus
mesh
Which of the following is primarily focused on identifying alternate solutions to achieve a task?
Preventative
Corrective
Recovery
Compensating
Detective
Which of the following is NOT an example of SSO?
SESAME
KErberos
LDAP
KryptoKnight
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat agent
The danger of having a vulnerability exploited
Threat
The probability of a threat being realized
Risk
Presence of a vulnerability which exposes the organization
Exposure
John's computer access changed with his reassignment to a new department. This is an example of:
Role-based access control
Access List Control
Need-to-Know control
Owner set access control
Mandatory access control
Which access control includes intrusion detection?
Administrative
Techincal
Owner
Technical
Physical
Organizational
Which of the following are the three components of the fire triangle?
Fire/Fuel/Oxygen
Heat/Combustion/Oxygen
Heat/Fuel/Oxygen
Fire/Combustion/Oxygen
Which of the following would be the least useful in attempting to crack a password?
LophtCrack
John the Ripper
brute force/dictionary attack
Packet sniffing
MAC the Knife
Which of the following is NOT an example of biometric identification?
Retinal imagery
Voice
Ear shape/pattern
Hand shape/pattern
Which access control requires sensitivity labels on all subjects and objects?
Discretionary access control
Manager set control
Which classification of fuel type is gasoline given?
C
A
B
D
Which access control includes job rotation?
Which of the following is NOT a RAW authentication protocol?
PAP
CHAP
EAP
Which of the following have the best CER?
Badge Scanning
Hand scanning
Iris Scanning
Finger scanning