1. A small room with two authentication doors - after gaining access to the 1st door the subject is locked in until access to granted to the 2nd door
2. ACL stands for...
3. Something you know - have - are or location
4. Access control model designed to prevent authorized access to classified information - concerned with information confidentiality
5. Feature of an OS that allows for logical access control by grouping subjects with common characteristics
6. Data can only be accessed through applications - designed to prevent unauthorized modification - errors and fraud
7. The most popular form of authentication
8. The process of recovering passwords from stored/transmitted data
9. Preset (key in knob) - deadbolt - combination padlock - cipher
10. Token that generates a password based on challenge/response
11. MAC - DAC - and RBAC
12. Information classification is no write up - no read down
13. Using any two authentication methods
14. Form of authentication that relies on human characteristic - fingerprint - hand geometry - facial recognition - eye scan - voice print - DNA - something you _________
15. A password attack that tries all possible combinations until the correct password is identified
16. A password attack that encrypts all the words in the dictionary and compares the resulting hash values with those of the password
17. Form of physical authentication - id/smart card - atm card - token - key - passport - something you __________
18. Data - hardware - networks - facility are access control ________
19. Error caused by biometrics where the system accepts impostors - also know as false acceptance rate (FAR)
20. Using three or more authentication methods
21. Password length/complexity help defend against this attack
22. Cognitive - dynamic - one-time - passphrase
23. Security controls that thwart a security breach - i.e. require user ID and password
24. Password type that best defends against password attacks - i.e. tokens
25. Lists of permission associated with objects - used in the DAC model - typically include a implicit deny rule
26. Access control model concerned with information integrity
27. Security controls that fix a problem or prevent further damage
28. Information classification is no read up - no write down
29. Dictionary - hybrid - brute force - rainbow table
30. Authentication method that include pin - password - code words - personal information
Comptia Security +: Network Security
Comptia Security +: Os Hardening
Comptia Security +: Wireless Security
CRISC Information Systems Control
ISTQB
MCSE
Related MCQ's