IT Security: Defense against the digital dark arts - Week 3 Already Passed
IT Security: Defense against the digital dark arts - Week 3 Already Passed How is authentication different from authorization? Authentication is verifying an identity; Authorization is verifying access to a resource What are some characteristics of a strong password? Check all that apply, At least eight characters long Includes number and special characters In a multi-factor authentication scheme, a password can be thought of as: Something you know What are some drawbacks to using biometrics for authentication? Check all that apply. Biometrics is impossible to change if compromised There are potential privacy concern In what way are U2F tokens more secure than OTP generators? They're resistant to phishing attack What elements of a certificate are inspected when a certificate is verified? Check all that apply. Trust of the signatory CA Not valid after and before date
Written for
- Institution
- IT SECURITY
- Course
- IT SECURITY
Document information
- Uploaded on
- April 15, 2024
- Number of pages
- 3
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
it security defense against the digital dark arts
Also available in package deal