Authentication Factors for Disabled Users
11 Questions
1 Views
3.5 Stars

Authentication Factors for Disabled Users

Created by
@LucrativeMagenta

Questions and Answers

What is the difference between a vulnerability and a threat?

A. A vulnerability is a weakness that can be exploited, while a threat is the potential for a vulnerability to be exploited

If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?

C. Threat

What is the difference between verification and authentication of an identity?

B. Verification confirms the validity of the credentials provided, while authentication confirms the identity of a person

What do you call the process in which the client authenticates to the server and the server authenticates to the client?

<p>A. Mutual authentication</p> Signup and view all the answers

A key would be described as which type of authentication factor?

<p>B. Possession factor</p> Signup and view all the answers

If you're using an identity card as the basis for your authentication scheme, what steps might you add to the process to allow you to move to multifactor authentication?

<p>B. Implement biometric factors like fingerprint or iris scan in addition to the identity card</p> Signup and view all the answers

Name three reasons why an identity card alone might not make an ideal method of authentication.

<p>D. All of the above</p> Signup and view all the answers

Based on the Parkerian hexad, what principles are affected if you lose a shipment of encrypted backup tapes that contain personal and payment information for your customers?

<p>A. Confidentiality and integrity</p> Signup and view all the answers

If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?

<p>A. Vulnerability</p> Signup and view all the answers

A key would be described as which type of authentication factor?

<p>B. Possession factor</p> Signup and view all the answers

Which authentication factors might you want to avoid in an environment with a larger number of disabled or injured users, such as a hospital?

<p>C. Knowledge factors like passwords or PINs</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser