Authentication Factors for Disabled Users

LucrativeMagenta avatar
LucrativeMagenta
·
·
Download

Start Quiz

Study Flashcards

11 Questions

What is the difference between a vulnerability and a threat?

A. A vulnerability is a weakness that can be exploited, while a threat is the potential for a vulnerability to be exploited

If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?

C. Threat

What is the difference between verification and authentication of an identity?

B. Verification confirms the validity of the credentials provided, while authentication confirms the identity of a person

What do you call the process in which the client authenticates to the server and the server authenticates to the client?

A. Mutual authentication

A key would be described as which type of authentication factor?

B. Possession factor

If you're using an identity card as the basis for your authentication scheme, what steps might you add to the process to allow you to move to multifactor authentication?

B. Implement biometric factors like fingerprint or iris scan in addition to the identity card

Name three reasons why an identity card alone might not make an ideal method of authentication.

D. All of the above

Based on the Parkerian hexad, what principles are affected if you lose a shipment of encrypted backup tapes that contain personal and payment information for your customers?

A. Confidentiality and integrity

If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?

A. Vulnerability

A key would be described as which type of authentication factor?

B. Possession factor

Which authentication factors might you want to avoid in an environment with a larger number of disabled or injured users, such as a hospital?

C. Knowledge factors like passwords or PINs

This quiz explores the authentication factors that are suitable or unsuitable in an environment with a larger number of disabled or injured users, such as a hospital. It covers factors like inherence (voice or facial recognition), possession (ID cards or tokens), knowledge (passwords or PINs), and biometric (fingerprint or iris scan). Test your knowledge and learn which factors are most appropriate in such a setting.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser