A) objects
B) USB tokens
C) one-time password token
D) public keys
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A password reset
B) A password management program
C) A system reset
D) An assertion
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Trojan horses and man-in-the-middle attacks
B) Trojan horses and single point of entry attacks
C) Terrorist attacks and man-in-the-middle attacks
D) Terrorist attacks and dumpster diving
Correct Answer
verified
Multiple Choice
A) biometric authentication
B) public key infrastructure
C) public key-private key pairs
D) two-factor authentication
Correct Answer
verified
Multiple Choice
A) 20 to 40
B) approximately 25
C) approximately 35
D) 30 to 60
Correct Answer
verified
Multiple Choice
A) Logging
B) Authenticating
C) Verifying
D) Authorizing
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) chip
B) token
C) PIN
D) magnetic strip
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Domain controller servers
B) directory servers
C) authentication servers
D) RADIUS servers
Correct Answer
verified
Multiple Choice
A) four to six digits
B) four to six characters
C) at least six digits
D) at least 10 digits
Correct Answer
verified
Multiple Choice
A) verification
B) acceptance
C) supplicant scanning
D) match index
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) USB token
B) RFID
C) one-time password token
D) public key-private key
Correct Answer
verified
Multiple Choice
A) the principle of minimum identity data
B) two-factor authentication
C) multifactor authentication
D) the principle of least permissions
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Kerberos
B) RADIUS
C) LDAP
D) MS-CHAP
Correct Answer
verified
Showing 21 - 40 of 63
Related Exams