Question: QUESTION 1 1. A certificate authority is a trusted third party that is responsible for issuing and revoking certificates within the public key infrastructure. True
QUESTION 1
1. A certificate authority is a trusted third party that is responsible for issuing and revoking certificates within the public key infrastructure.
True
False
10 points
QUESTION 2
1. Access control systems can be deployed as stand-alone systems.
True
False
10 points
QUESTION 3
1. Which is the most critical factor in the success of a Access Control system?
|
| a. | Network integration |
|
| b. | Availability |
|
| c. | Accuracy |
|
| d. | User acceptance |
10 points
QUESTION 4
1. Haptic is a concept pertaining to which sense?
|
| a. | smell |
|
| b. | hearing |
|
| c. | touch |
|
| d. | vision |
10 points
QUESTION 5
1. Which of the following is not a Single Sign-on (SSO) Solution
|
| Kerberos | |
|
| SESAME | |
|
| Kermit | |
|
| Directory Services |
10 points
QUESTION 6
1. Deny permissions always override Allow permissions.
True
False
10 points
QUESTION 7
1. Discretionary Access Control (DAC) manages access to resources using what primary element or aspect?
|
| Classification | |
|
| Rules | |
|
| Age | |
|
| Identity |
10 points
QUESTION 8
1. A smart card cannot store a biometric template directly on the card.
True
False
10 points
QUESTION 9
1. By assigning access permissions so that users can only access those resources which are required to accomplish their specific work tasks, you would be in compliance with?
|
| a. | Cross Training |
|
| b. | Principle of least privilege |
|
| c. | Need to Know |
|
| d. | Job Rotation |
10 points
QUESTION 10
1. ____ provides access to resources based on a users assigned role.
|
| a. | Device authentication |
|
| b. | Anonymous access control |
|
| c. | Role-privilege access control |
|
| d. | Role-based access control |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
