CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 14
•
14
Which of the following is NOT an authentication
protocol:
•
15
The categories of controls are:
•
16
Organizations that implement two-factor
authentication often do not adequately plan. One result of this is:
•
17
Buffer overflow, SQL injection, and stack
smashing are examples of:
•
18
A biomet ric authentication system that
incorporates the results of newer scans into a user's profile is
less likely to:
•
19
One disadvantage of the use of digital certificates
as a means for two-factor authentication is NOT: