Filters
Question type

A directory server database schema is a hierarchical collection of ________.


A) objects
B) USB tokens
C) one-time password token
D) public keys

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

A USB token is a small device that plugs into a computer's USB port to identify the owner.

A) True
B) False

Correct Answer

verifed

verified

________ is having the ability to create a new password for an account.


A) A password reset
B) A password management program
C) A system reset
D) An assertion

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Nearly all directory servers support LDAP.

A) True
B) False

Correct Answer

verifed

verified

Which of the following can negate the strength of two-factor authentication?


A) Trojan horses and man-in-the-middle attacks
B) Trojan horses and single point of entry attacks
C) Terrorist attacks and man-in-the-middle attacks
D) Terrorist attacks and dumpster diving

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

A physical access card and a PIN are an example of ________.


A) biometric authentication
B) public key infrastructure
C) public key-private key pairs
D) two-factor authentication

E) All of the above
F) None of the above

Correct Answer

verifed

verified

The International Data Corporation estimates that ________ percent of all accounts in larger corporations are inappropriate.


A) 20 to 40
B) approximately 25
C) approximately 35
D) 30 to 60

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

________ records the actions that an account owner takes on a resource.


A) Logging
B) Authenticating
C) Verifying
D) Authorizing

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

The false acceptance rate increases as the number of templates increases.

A) True
B) False

Correct Answer

verifed

verified

The simplest access card use a ________.


A) chip
B) token
C) PIN
D) magnetic strip

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

RBAC stands for role-based access control.

A) True
B) False

Correct Answer

verifed

verified

Central authentication servers are quite expensive and tend to not reduce costs for a company.

A) True
B) False

Correct Answer

verifed

verified

Most companies use ________ to store data centrally in their firms.


A) Domain controller servers
B) directory servers
C) authentication servers
D) RADIUS servers

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

A PIN is typically ________.


A) four to six digits
B) four to six characters
C) at least six digits
D) at least 10 digits

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

In, ________ the verifier determines whether the supplicant is a particular person.


A) verification
B) acceptance
C) supplicant scanning
D) match index

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Computer attacks rarely take place remotely over networks.

A) True
B) False

Correct Answer

verifed

verified

A proximity access token contains a small ________ as a new alternative to physical security.


A) USB token
B) RFID
C) one-time password token
D) public key-private key

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

In planning authorizations, it is important to follow ________.


A) the principle of minimum identity data
B) two-factor authentication
C) multifactor authentication
D) the principle of least permissions

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Directory servers are central repositories for information about people, equipment, software, and databases.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is arguably the most popular central authentication server standard?


A) Kerberos
B) RADIUS
C) LDAP
D) MS-CHAP

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 63

Related Exams

Show Answer