Home > Articles

  • Print
  • + Share This
This chapter is from the book

Practice Questions (True or False)

  1. War dialing is an attack that targets a wireless network.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 192
    Detailed Answer: 203

  2. Encryption is an example of a technical control.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 192
    Detailed Answer: 203

  3. Access controls should default to full access.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 203

  4. TACACS is an example of centralized access technology.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 203

  5. Kerberos addresses availability.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 203

  6. An example of an IDS engine is signature-based.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 203

  7. Stateful matching is a type of signature-based IDS.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 203

  8. SATAN is an example of a vulnerability scanner.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 203

  9. Software faults can be uncovered with watchdog timers.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 203

  10. PAP is considered a secure protocol.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 203

  11. Diameter is not an AAA protocol.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  12. Attribute value pairs are used with SESAME.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  13. A token, ticket, or key can be a capability.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  14. MAC allows the owner to determine who has access.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  15. Static separation of duties is one way to restrict the combination of duties.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  16. IDaaS solutions provide a range of identity and access management services such as single sign-on (SSO) functionality through the cloud.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  17. Retina scanning matches the person’s blood vessels on the back of the eye and is very accurate.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  18. TACACS+ supports two-factor authentication.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  19. Centralized authentication allows a subject to be authenticated by a system only once and then access resource after resource repeatedly.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  20. Tokens are an example of type II authentication.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  21. Keyboard dynamics is an example of type III authentication.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  22. Scrubbing is the act of clearing a hard drive for destruction or resale.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 204

  23. Keystroke monitoring is a form of biometrics.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 205

  24. A federated identity is an identity management system (IdM) that is considered portable.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 205

  25. Type I authentication systems typically have a clipping level set to 3.

    • circ.jpg True

    • circ.jpg False

    Quick Answer: 193
    Detailed Answer: 205

  • + Share This
  • 🔖 Save To Your Account