Security policies chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which characteristic of a bio-metric system measures the system's accuracy using a balance of different error types?

Crossover error rate (CER)

Voice pattern biometrics are accurate for authentication because voices can't easily be replicated by computer software.

False

You should use easy-to-remember personal information to create secure passwords.

False

Which type of authentication includes smart cards?

Ownership

Which one of the following is an example of a logical access control?

Password

The __________ is the central part of a computing environment's hardware,software, and firmware that enforces access control.

Security Kernel

Which one of the following is an example of two-factor authentication?

Smart card and PIN

A smart card is a token shaped like a credit card that contains one or more microprocessor chips that accept, store, and send information through a reader.

True

A trusted operating system (TOS) provides features that satisfy specific government requirements for security

True

Which of the following is not a commonly accepted best practice for password security?

Use at least six alphanumeric characters

Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of access control is Ed concerned about?

Accountability

During which phase of the access control process does the system answer the question, "What can the requester access?"

Authorization

The four central components of access control are users, resources, actions, and features.

False

The number of failed logon attempts that trigger an account action is called an audit logon event.

False

Fingerprints, palm prints, and retina scans are types of biometrics

True

Alan is evaluating different biometric systems and is concerned that users might not want to subject themselves to retinal scans due to privacy concerns. Which characteristic of a biometric system is he considering?

Acceptability

Which type of password attack attempts all possible combinations of a password in an attempt to guess the correct value?

Brute-force attack

Passphrases are less secure than passwords.

False

A dictionary attack works by hashing all the words in a dictionary and then comparing the hashed value with the system password file to discover a match.

True

Common methods used to identify a user to a system include username, smart card, and biometrics

True


Ensembles d'études connexes

GEODe: Deserts and Wind - Distribution and Causes of Dry Lands

View Set

Ops Final Exam Study Guide Part 4

View Set

SIE Chapter 8: Customer Accounts

View Set

13 - Time - repères temporels - les phrases

View Set

Chap. 41 Theoretical Models of Personality Development

View Set

115 PrepU Ch. 36: Management of Patients with Musculoskeletal Disorders

View Set

Neuro/Lung Pathophys Resource Questions

View Set