CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 10

• 14 Which of the following is NOT an authentication protocol: • 15 The categories of controls are: • 16 Organizations that implement two-factor authentication often do not adequately plan. One result of this is: • 17 Buffer overflow, SQL injection, and stack smashing are examples of: • 18 A biometric authentication system that incorporates the results of newer scans into a user's profile is less likely to: • • 19 One disadvantage of the use of digital certificates as a means for two-factor authentication is NOT: • 20 • 21 Which of the following statements about Crossover Error Rate (CER) is true: 22 A smart card is a good form of two-factor authentication because: The reason why preventive controls are preferred over detective controls is: • 23 What is the best defense against social engineering?