11 Questions
What is the difference between a vulnerability and a threat?
A. A vulnerability is a weakness that can be exploited, while a threat is the potential for a vulnerability to be exploited
If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?
C. Threat
What is the difference between verification and authentication of an identity?
B. Verification confirms the validity of the credentials provided, while authentication confirms the identity of a person
What do you call the process in which the client authenticates to the server and the server authenticates to the client?
A. Mutual authentication
A key would be described as which type of authentication factor?
B. Possession factor
If you're using an identity card as the basis for your authentication scheme, what steps might you add to the process to allow you to move to multifactor authentication?
B. Implement biometric factors like fingerprint or iris scan in addition to the identity card
Name three reasons why an identity card alone might not make an ideal method of authentication.
D. All of the above
Based on the Parkerian hexad, what principles are affected if you lose a shipment of encrypted backup tapes that contain personal and payment information for your customers?
A. Confidentiality and integrity
If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?
A. Vulnerability
A key would be described as which type of authentication factor?
B. Possession factor
Which authentication factors might you want to avoid in an environment with a larger number of disabled or injured users, such as a hospital?
C. Knowledge factors like passwords or PINs
This quiz explores the authentication factors that are suitable or unsuitable in an environment with a larger number of disabled or injured users, such as a hospital. It covers factors like inherence (voice or facial recognition), possession (ID cards or tokens), knowledge (passwords or PINs), and biometric (fingerprint or iris scan). Test your knowledge and learn which factors are most appropriate in such a setting.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free