mod 5 itn 266

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Long passwords that use several types of keyboard characters are called ________ passwords.


complex

2
New cards

Which of the following is one of the rules for working in secure areas?


Electronic devices that can record or copy mass amounts of information should be forbidden in secure areas.

When no one is in a secure area, it should be locked and verified periodically.

Unsupervised work in secure areas should be avoided.

3
New cards

________ is the process of assessing the identity of each individual claiming to have permission to use a resource.

Authentication

4
New cards

Buildings should be set back from streets and protected with rolling hill landscaping to reduce threats from ________.

terrorism

5
New cards

The major promise of biometrics is to replace reusable passwords

True, the surrounding page content, the major promise of biometrics is to replace reusable passwords

6
New cards

A false rejection occurs when a person is improperly matched to a template.

false, A false rejection occurs when a legitimate user is not matched to their correct template during biometric authentication

7
New cards

In military security, the term multilevel security means multifactor security.

false,

Multilevel security refers to a system's ability to handle information at different classification levels, ensuring that users only access data they are authorized to see.

Multifactor security, on the other hand, involves using multiple authentication methods to verify a user's identity.

8
New cards

Compared to access control based on individual accounts, RBAC is ________.

 

less prone to error


9
New cards

Passwords should be changed frequently.


True, it helps reduce risk of unauthorized access.

10
New cards

________ is the process of collecting information about the activities of each individual in log files for immediate and later analysis.

Auditing

11
New cards

Most users who have access to servers use reusable passwords for authentication.

True,

Most users who have access to servers rely on reusable passwords for authentication. While reusable passwords are convenient, they are less secure compared to alternatives like biometrics or multi-factor authenticatio

12
New cards

A ________ card stores authentication data.


 

Both magnetic stripe and smart


These types of cards store authentication data, enabling secure access to systems or resources

13
New cards

If a laptop needs to be taken off premises, ________.


  

it should be first be logged out.

 

all sensitive information should be removed

it should be logged in when returned

14
New cards

________ is a social engineering trick where an intruder may follow an authorized user through a door that the authorized user opens with an access device.


Piggybacking

a social engineering trick where an unauthorized individual gains access to a restricted area by following an authorized user.

15
New cards

Which of the following is one of the four bases for authentication credentials?


 

Both what you know and what you have


(and who you are (bio), and what you do, behavior)

16
New cards

During enrollment, the scanner sends ________ to the authentication system.

key features,

are extracted from the scanned data, such as a fingerprint or other biometric input, and are used to create a unique template for future authentication attempts

17
New cards

PCs should require login screens with complex passwords.


True, . Requiring login screens with complex passwords enhances security by making it harder for unauthorized users to gain access

18
New cards

________ can be much shorter than ________.


Pins, Passwords

pins are always shorter then password.

19
New cards

________ is the process of assessing the identity of each individual claiming to have permission to use a resource.

Authentication,

20
New cards

Two-factor authentication can be defeated if ________.


Both the user's computer is compromised and the attacker uses a man-in-the-middle attack

These vulnerabilities allow attackers to intercept or manipulate authentication processes, undermining the security of two-factor authentication systems.