11.
When a user is asked for a password by a system, what process is the system performing?
- A.Evaluation
- B.Identification
- C.Authentication
- D.Authorization
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The system is performing authentication. Option A is a distractor. Option B is incorrect because, in this case, the password is not used as identifi cation. Option D is incorrect because the password does not provide authorization to the user. |
12.
Authorization for multiple applications using one set of credentials is best described by
which of the following?
- A.Authorization
- B.Single Sign-on
- C.Multi-factor
- D.Enrollment
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
The other answers are distractors. |
13.
If information being protected is critical, which is the best course of action?
- A.The encryption password should be changed more frequently
- B.The data should be used less frequently
- C.The data should be hidden from other processes
- D.Users should be provided public encryption keys
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Options B, C, and D are distractors. |
14.
What are the three categories of controls?
- A.Physical, detective, and logical (technical)
- B.Administrative, physical, and preventative
- C.Administrative, logical (technical), and physical
- D.Physical, logical (technical), and administrative
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Options A, B, and C are distractors. |
15.
Which of the following best describes the use of the password generated by a synchronous
token device?
- A.The password must be used within a variable time interval
- B.The password must be used within a fixed time interval
- C.The password is not dependent upon time
- D.The password is of variable length
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Options A, C, and D are distractors. |