Which of the following would assist the most in Host Based intrusion detection?
What is called the percentage at which the False Rejection Rate equals the False Acceptance Rate?
What is called an automated means of identifying or authenticating the identity of a living person based on physiological or behavioral characteristics?
Which of the following is most appropriate to notify an external user that session monitoring is being conducted?
The primary service provided by Kerberos is which of the following?
Which of the following statements pertaining to biometrics is FALSE?
Which is the last line of defense in a physical security sense?
Which of the following is NOT a form of detective administrative control?
A confidential number used as an authentication factor to verify a user's identity is called a:
Which division of the Orange Book deals with discretionary protection (need-to-know)?
Because all the secret keys are held and authentication is performed on the Kerberos TGS and the authentication servers, these servers are vulnerable to:
What security model is dependent on security labels?
For maximum security design, what type of fence is most effective and cost-effective method (Foot are being used as measurement unit below)?
Guards are appropriate whenever the function required by the security program involves which of the following?
Controls like guards and general steps to maintain building security, securing of server rooms or laptops, the protection of cables, and usage of magnetic switches on doors and windows are some of the examples of:
Which of the following can best eliminate dial-up access through a Remote Access Server as a hacking vector?
A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:
Which of the following Kerberos components holds all users' and services' cryptographic keys?
In biometrics, "one-to-many" search against database of stored biometric images is done in:
To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up: