•
17
The use of retina scanning as a biometric
authentication method has not gained favor because:
•
18
Buffer overflow, SQL injection, and stack
smashing are examples of:
•
19
Which of the following statements about
Crossover Error Rate (CER) is true:
•
20
In an information system that authenticates
users based on userid and password, the primary reason for
storing a hash of the password instead of storing the encrypted
password is:
•
21 The reason why preventive controls are preferred
over detective controls is:
•
•
22
Video surveillance is an example of what
type(s) of control:
23 Which of the following is NOT an authentication
protocol: