Page261
-
What is an XML-based framework for exchanging security information, including authentication data?
A. Kerberos
B. OpenID
C. SAML
D. TACACS -
Which authentication protocol leverages tokens for communicating identity information details?
A. OAuth
B. OIDC
C. SAML
D. Kerberos -
Server A trusts server B. Server B trusts Server C. Server A therefore trusts server C. What term describes this trust relationship?
A. Domain trust
B. Forest trust
C. Non-transitive trust
D. Transitive trust -
A policy that states a user must have a business requirement to view data before attempting to do so is an example of enforcing what?
A. Least privilege
B. Need to know
C. Rotation of duties
D. Separation of duties -
What technique would raise the False Accept Rate (FAR) and lower the False Reject Rate (FRR) in a fingerprint scanning system?
A. Decrease the amount of minutiae that is verified
B. Increase the amount of minutiae that is verified
C. Lengthen the enrollment time
D. Lower the throughput time
Self-Test Quick Answer Key
- A
- B
- D
- C
- D
- B
- B
- B
- C
- C
- C
- B
- D
- B
- A