1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Long passwords that use several types of keyboard characters are called ________ passwords.
complex
Which of the following is one of the rules for working in secure areas?
Electronic devices that can record or copy mass amounts of information should be forbidden in secure areas.
When no one is in a secure area, it should be locked and verified periodically.
Unsupervised work in secure areas should be avoided.
________ is the process of assessing the identity of each individual claiming to have permission to use a resource.
Authentication
Buildings should be set back from streets and protected with rolling hill landscaping to reduce threats from ________.
terrorism
The major promise of biometrics is to replace reusable passwords
True, the surrounding page content, the major promise of biometrics is to replace reusable passwords
A false rejection occurs when a person is improperly matched to a template.
false, A false rejection occurs when a legitimate user is not matched to their correct template during biometric authentication
In military security, the term multilevel security means multifactor security.
false,
Multilevel security refers to a system's ability to handle information at different classification levels, ensuring that users only access data they are authorized to see.
Multifactor security, on the other hand, involves using multiple authentication methods to verify a user's identity.
Compared to access control based on individual accounts, RBAC is ________.
less prone to error
Passwords should be changed frequently.
True, it helps reduce risk of unauthorized access.
________ is the process of collecting information about the activities of each individual in log files for immediate and later analysis.
Auditing
Most users who have access to servers use reusable passwords for authentication.
True,
Most users who have access to servers rely on reusable passwords for authentication. While reusable passwords are convenient, they are less secure compared to alternatives like biometrics or multi-factor authenticatio
A ________ card stores authentication data.
Both magnetic stripe and smart
These types of cards store authentication data, enabling secure access to systems or resources
If a laptop needs to be taken off premises, ________.
it should be first be logged out.
all sensitive information should be removed
it should be logged in when returned
________ is a social engineering trick where an intruder may follow an authorized user through a door that the authorized user opens with an access device.
Piggybacking
a social engineering trick where an unauthorized individual gains access to a restricted area by following an authorized user.
Which of the following is one of the four bases for authentication credentials?
Both what you know and what you have
(and who you are (bio), and what you do, behavior)
During enrollment, the scanner sends ________ to the authentication system.
key features,
are extracted from the scanned data, such as a fingerprint or other biometric input, and are used to create a unique template for future authentication attempts
PCs should require login screens with complex passwords.
True, . Requiring login screens with complex passwords enhances security by making it harder for unauthorized users to gain access
________ can be much shorter than ________.
Pins, Passwords
pins are always shorter then password.
________ is the process of assessing the identity of each individual claiming to have permission to use a resource.
Authentication,
Two-factor authentication can be defeated if ________.
Both the user's computer is compromised and the attacker uses a man-in-the-middle attack
These vulnerabilities allow attackers to intercept or manipulate authentication processes, undermining the security of two-factor authentication systems.