Podcast
Questions and Answers
What is the difference between a vulnerability and a threat?
What is the difference between a vulnerability and a threat?
If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?
If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?
What is the difference between verification and authentication of an identity?
What is the difference between verification and authentication of an identity?
What do you call the process in which the client authenticates to the server and the server authenticates to the client?
What do you call the process in which the client authenticates to the server and the server authenticates to the client?
Signup and view all the answers
A key would be described as which type of authentication factor?
A key would be described as which type of authentication factor?
Signup and view all the answers
If you're using an identity card as the basis for your authentication scheme, what steps might you add to the process to allow you to move to multifactor authentication?
If you're using an identity card as the basis for your authentication scheme, what steps might you add to the process to allow you to move to multifactor authentication?
Signup and view all the answers
Name three reasons why an identity card alone might not make an ideal method of authentication.
Name three reasons why an identity card alone might not make an ideal method of authentication.
Signup and view all the answers
Based on the Parkerian hexad, what principles are affected if you lose a shipment of encrypted backup tapes that contain personal and payment information for your customers?
Based on the Parkerian hexad, what principles are affected if you lose a shipment of encrypted backup tapes that contain personal and payment information for your customers?
Signup and view all the answers
If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?
If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?
Signup and view all the answers
A key would be described as which type of authentication factor?
A key would be described as which type of authentication factor?
Signup and view all the answers
Which authentication factors might you want to avoid in an environment with a larger number of disabled or injured users, such as a hospital?
Which authentication factors might you want to avoid in an environment with a larger number of disabled or injured users, such as a hospital?
Signup and view all the answers