CIS 502 Midterm Set 2 CIS 502 Midterm Set 2 | Page 3
•
15
The categories of controls are:
•
16
A biometric authentication system that incorporates the results of newer scans
into a user's profile is less likely to:
•
17
The use of retina scanning as a biometric authentication method has not gained
favor because:
• 18 Buffer overflow, SQL injection, and stack smashing are examples of:
• 19 Which of the following statements about Crossover Error Rate (CER) is true:
•
20
In an information system that authenticates users based on userid and password,
the primary reason for storing a hash of the password instead of storing the encrypted
password is:
• 21 The reason why preventive controls are preferred over detective controls is:
• 22
• 23 Which of the following is NOT an authentication protocol:
Video surveillance is an example of what type(s) of control:
•
24 An information system that processes sensitive information is configured to require
a valid userid and strong password from any user. This process of accepting and validating this
information is known as: