Podcast
Questions and Answers
Which category of attack is an attack against confidentiality?
Which category of attack is an attack against confidentiality?
Using the concept of defense in depth, what layers might you use to secure yourself against someone removing confidential data from your environment on a USB flash drive?
Using the concept of defense in depth, what layers might you use to secure yourself against someone removing confidential data from your environment on a USB flash drive?
What biometric factor describes how well a characteristic resists change over time?
What biometric factor describes how well a characteristic resists change over time?
Which of the following steps might you add to the authentication process to transition from using an identity card to multifactor authentication?
Which of the following steps might you add to the authentication process to transition from using an identity card to multifactor authentication?
Signup and view all the answers
Which of the following is NOT a reason why an identity card alone might not be an ideal method of authentication?
Which of the following is NOT a reason why an identity card alone might not be an ideal method of authentication?
Signup and view all the answers
Which factors might you consider when implementing a multifactor authentication scheme for users logging onto workstations in secure environments used by multiple people?
Which factors might you consider when implementing a multifactor authentication scheme for users logging onto workstations in secure environments used by multiple people?
Signup and view all the answers
In an environment with a larger number of disabled or injured users, such as a hospital, which authentication factors might you want to use or avoid?
In an environment with a larger number of disabled or injured users, such as a hospital, which authentication factors might you want to use or avoid?
Signup and view all the answers