- Practice Questions
- Practice Questions (True or False)
- Practice Questions (Mix and Match)
- Quick-Check Answer Key
- Answers and Explanations
Practice Questions (True or False)
War dialing is an attack that targets a wireless network.
True
False
Quick Answer: 192
Detailed Answer: 203Encryption is an example of a technical control.
True
False
Quick Answer: 192
Detailed Answer: 203Access controls should default to full access.
True
False
Quick Answer: 193
Detailed Answer: 203TACACS is an example of centralized access technology.
True
False
Quick Answer: 193
Detailed Answer: 203Kerberos addresses availability.
True
False
Quick Answer: 193
Detailed Answer: 203An example of an IDS engine is signature-based.
True
False
Quick Answer: 193
Detailed Answer: 203Stateful matching is a type of signature-based IDS.
True
False
Quick Answer: 193
Detailed Answer: 203SATAN is an example of a vulnerability scanner.
True
False
Quick Answer: 193
Detailed Answer: 203Software faults can be uncovered with watchdog timers.
True
False
Quick Answer: 193
Detailed Answer: 203PAP is considered a secure protocol.
True
False
Quick Answer: 193
Detailed Answer: 203Diameter is not an AAA protocol.
True
False
Quick Answer: 193
Detailed Answer: 204Attribute value pairs are used with SESAME.
True
False
Quick Answer: 193
Detailed Answer: 204A token, ticket, or key can be a capability.
True
False
Quick Answer: 193
Detailed Answer: 204MAC allows the owner to determine who has access.
True
False
Quick Answer: 193
Detailed Answer: 204Static separation of duties is one way to restrict the combination of duties.
True
False
Quick Answer: 193
Detailed Answer: 204IDaaS solutions provide a range of identity and access management services such as single sign-on (SSO) functionality through the cloud.
True
False
Retina scanning matches the person’s blood vessels on the back of the eye and is very accurate.
True
False
TACACS+ supports two-factor authentication.
True
False
Centralized authentication allows a subject to be authenticated by a system only once and then access resource after resource repeatedly.
True
False
Quick Answer: 193
Detailed Answer: 204Tokens are an example of type II authentication.
True
False
Keyboard dynamics is an example of type III authentication.
True
False
Scrubbing is the act of clearing a hard drive for destruction or resale.
True
False
Keystroke monitoring is a form of biometrics.
True
False
A federated identity is an identity management system (IdM) that is considered portable.
True
False
Type I authentication systems typically have a clipping level set to 3.
True
False
Quick Answer: 193
Detailed Answer: 204
Quick Answer: 193
Detailed Answer: 204
Quick Answer: 193
Detailed Answer: 204
Quick Answer: 193
Detailed Answer: 204
Quick Answer: 193
Detailed Answer: 204
Quick Answer: 193
Detailed Answer: 204
Quick Answer: 193
Detailed Answer: 205
Quick Answer: 193
Detailed Answer: 205
Quick Answer: 193
Detailed Answer: 205