Podcast
Questions and Answers
Which category of attack is an attack against confidentiality?
Which category of attack is an attack against confidentiality?
- SQL Injection
- Social Engineering (correct)
- Man-in-the-Middle (MitM)
- Denial of Service (DoS)
Using the concept of defense in depth, what layers might you use to secure yourself against someone removing confidential data from your environment on a USB flash drive?
Using the concept of defense in depth, what layers might you use to secure yourself against someone removing confidential data from your environment on a USB flash drive?
- Encryption and Access Controls (correct)
- Physical Security and User Awareness Training
- Firewall and Intrusion Detection System (IDS)
- Antivirus Software and Data Loss Prevention (DLP)
What biometric factor describes how well a characteristic resists change over time?
What biometric factor describes how well a characteristic resists change over time?
- Stability (correct)
- Accuracy
- Uniqueness
- Performance
Which of the following steps might you add to the authentication process to transition from using an identity card to multifactor authentication?
Which of the following steps might you add to the authentication process to transition from using an identity card to multifactor authentication?
Which of the following is NOT a reason why an identity card alone might not be an ideal method of authentication?
Which of the following is NOT a reason why an identity card alone might not be an ideal method of authentication?
Which factors might you consider when implementing a multifactor authentication scheme for users logging onto workstations in secure environments used by multiple people?
Which factors might you consider when implementing a multifactor authentication scheme for users logging onto workstations in secure environments used by multiple people?
In an environment with a larger number of disabled or injured users, such as a hospital, which authentication factors might you want to use or avoid?
In an environment with a larger number of disabled or injured users, such as a hospital, which authentication factors might you want to use or avoid?