• 16 A biometric authentication system that incorporates the results of newer scans into a user ' s profile is less likely to :
• 17 The use of retina scanning as a biometric authentication method has not gained favor because :
• 18 Buffer overflow , SQL injection , and stack smashing are examples of :
• 19 Which of the following statements about Crossover Error Rate ( CER ) is true :
• 20 In an information system that authenticates users based on userid and password , the primary reason for storing a hash of the password instead of storing the encrypted password is :
• 21 The reason why preventive controls are preferred over detective controls is :
• 22 Video surveillance is an example of what type ( s ) of control :
• 23 Which of the following is NOT an authentication protocol :
• 24 An information system that processes sensitive information is configured to require a valid userid and strong
• 15 The categories of controls are :
• 16 A biometric authentication system that incorporates the results of newer scans into a user ' s profile is less likely to :
• 17 The use of retina scanning as a biometric authentication method has not gained favor because :
• 18 Buffer overflow , SQL injection , and stack smashing are examples of :
• 19 Which of the following statements about Crossover Error Rate ( CER ) is true :
• 20 In an information system that authenticates users based on userid and password , the primary reason for storing a hash of the password instead of storing the encrypted password is :
• 21 The reason why preventive controls are preferred over detective controls is :
• 22 Video surveillance is an example of what type ( s ) of control :
• 23 Which of the following is NOT an authentication protocol :
• 24 An information system that processes sensitive information is configured to require a valid userid and strong