CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 10
•
14
Which of the following is NOT an authentication
protocol:
•
15
The categories of controls are:
•
16
Organizations that implement two-factor
authentication often do not adequately plan. One result of this is:
•
17
Buffer overflow, SQL injection, and stack
smashing are examples of:
•
18
A biometric authentication system that
incorporates the results of newer scans into a user's profile is
less likely to:
•
•
19
One disadvantage of the use of digital certificates
as a means for two-factor authentication is NOT:
• 20
• 21
Which of the following statements about
Crossover Error Rate (CER) is true:
22
A smart card is a good form of two-factor
authentication because:
The reason why preventive controls are preferred
over detective controls is:
•
23
What is the best defense
against social engineering?