- What access control method weighs additional factors, such as time of attempted access, before granting access?
(a) Content-dependent access control
(b) Context-dependent access control
(c) Role-based access control
(d) Task-based access control - What service is known as cloud identity, which allows organisations to leverage cloud service for identity management?
(a) IaaS
(b) IDaaS
(c) PaaS
(d) SaaS - What is an XML-based framework for exchanging security information, including authentication data?
(a) Kerberos
(b) OpenID
(c) SAML
(d) SESAME - What protocol is a common open protocol for interfacing and querying directory service information provided by network operating systems using port 389 via TCP or UDP?
(a) CHAP
(b) LDAP
(c) PAP
(d) RADIUS - What technique would raise the false accept rate (FAR) and lower the false
reject rate (FRR) in a fingerprint scanning system?
(a) Decrease the amount of minutiae that is verified
(b) Increase the amount of minutiae that is verified
(c) Lengthen the enrollment time
(d) Lower the throughput time
Answers in comments
Q1: (b) Context-dependent access control
Q2: (b) IDaaS (identity as a service)
Q3: (c) SAML
Q4: (b) LDAP
Q5: (a) Decrease the amount of minutiae that is verified (will make the accuracy of the system lower, which lowers false rejections but raises false acceptances)
LikeLike