38 audits background checks video cameras and

Info iconThis preview shows pages 10–13. Sign up to view the full content.

View Full Document Right Arrow Icon
38 Audits, background checks, video cameras, and listening devices are known as A. Discretionary controls B. Physical controls C. Preventive controls D. Detective controls Answer: D See Chapter 4. Detective controls are those controls that are designed to detect security events but can't prevent them in the way that preventive controls can. 39 Smart cards, fences, guard dogs, and card-key access are known as A. Mandatory controls B. Physical controls C. Preventive controls D. Detective controls Answer: C See Chapter 4. Preventive controls are those that are used to prevent security events. 40 Is identification weaker than authentication?
Background image of page 10

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
A. Yes: Identity is based only on the assertion of identity without providing proof. B. Yes: Identification uses ASCII data, whereas authentication uses binary data. C. No: Identification and authentication provide the same level of identity. D. No: They're used in different contexts and have nothing to do with each other. Answer: A See Chapter 4. Identification is only the assertion of identity, whereas authentication is the proof of identity. 41 Two-factor authentication is so-called because A. It requires two of the three authentication types. B. Tokens use two-factor encryption to hide their secret algorithms. C. Authentication difficulty is increased by a factor of two. D. It uses a factor of two prime numbers algorithm for added strength. Answer: A See Chapter 4. Two-factor authentication requires any two of Type 1 (something you know), Type 2 (something you have), and Type 3 (something you are) authentication. 42 The term something you are refers to A. A user’s security clearance B. A user’s role C. Two-factor authentication D. Biometric authentication Answer: D See Chapter 4. Something you are refers to authentication that measures something physical, such as a fingerprint, retina scan, or voiceprint. 43 Two-factor authentication is stronger than single-factor authentication because A. It uses a factor of two prime numbers algorithm for added strength. B. It relies on two factors, such as a password and a smart card. C. Authentication difficulty is increased by a factor of two. D. The user must be physically present to authenticate.
Background image of page 11
Answer: B See Chapter 4. Two-factor authentication requires any two of Type 1 (something you know), Type 2 (something you have), and Type 3 (something you are) authentication. 44 Finger print, retinal scan, and palm scans are examples of A. Biometric authentication B. Physical controls C. Type 2 authentication D. Three-factor authentication Answer: A See Chapter 4. These are all biometrics. Other examples include hand geometry scans, voice scans, and signature scans. 45 Tokens, smart cards, and ATM cards are examples of A. Logical controls B. Identifiers C. Something you have D. Type 3 authentication Answer: C See Chapter 4. These are examples of something you have, also known as Type 2 authentication. 46
Background image of page 12

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page10 / 13

38 Audits background checks video cameras and listening...

This preview shows document pages 10 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online