58 which of the following is not a characteristic of

Info iconThis preview shows pages 2–5. Sign up to view the full content.

View Full Document Right Arrow Icon
58 Which of the following is NOT a characteristic of biometrics? A. It can experience high false negatives. B. It can experience high false positives. C. Throughput rates aren't an issue. D. Biometric databases can become very large. Answer: C
Background image of page 2

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
See Chapter 4. Throughput rates are an issue with biometrics. 59 One of the difficulties associated with network-based intrusion detection systems (IDSs) is A. Synchronizing the signature file with the firewall B. The steep learning curve associated with IDS C. The high number of false negatives that must be eliminated D. The high number of false positives that must be eliminated Answer: D See Chapter 4. IDS is known for a high number of false positives that must be eliminated one by one. 60 Which of the following is NOT an obstacle to implementing two- factor authentication? A. The need to integrate two-factor authentication into systems and applications B. The high cost of implementation C. Integrating two-factor authentication into the building’s badge entry system D. The increased total cost of ownership (TCO) over single-factor authentication Answer: C See Chapter 4. two-factor authentication for authentication into IT systems is rarely integrated with a badge entry system. We would not, for instance, expect to see a USB key two-factor authentication system also used to control entry into physical spaces. 61 A database containing the data structures used by an application is known as A. A data encyclopedia B. A data dictionary C. Metadata D. A schema Answer: B See Chapter 5. A data dictionary contains information about an application’s data structures, including table names, field names, indexes, and so on. 62 The purpose of a Service Level Agreement is A. To guarantee a minimum quality of service for an application or function
Background image of page 3
B. To guarantee the maximum quality of service for an application or function C. To identify gaps in availability of an application D. To correct issues identified in a security audit Answer: A See Chapter 5. A Service Level Agreement (SLA) defines minimum performance metrics of an application or service. 63 CRCs, parity checks, and checksums are examples of A. Corrective application controls B. Message digests C. Preventive application controls D. Detective application controls Answer: D See Chapter 5. They're examples of detective application controls because they're designed to help discover security breaches (as well as network malfunctions and other undesired events) in a network. 64 Data mining A. Can be performed by privileged users only B. Is generally performed after hours because it’s resource intensive C. Refers to searches for correlations in a data warehouse D. Is the term used to describe a hacker who has broken into a database Answer: C See Chapter 5. Data mining is the term used to describe searches for correlations, patterns, and trends in a data warehouse. 65
Background image of page 4

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page2 / 13

58 Which of the following is NOT a characteristic of...

This preview shows document pages 2 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online