ITN 266 Chapter 5 Questions and
Answers |100% Pass
A security assertion may contain ________. - Answer✔✔-both authenticity information and
attributes, such as spending limits for purchasers
Microsoft's directory server product is ________. - Answer✔✔-Active Directory
For watch lists of criminals, a false acceptance is worse than a false rejection from a security
viewpoint. - Answer✔✔-false
Directory servers can hold information about ________. - Answer✔✔-both people and
computers
A false acceptance occurs when a person is improperly matched to a template. - Answer✔✔-
true
Which of the following statements accurately describes fingerprint recognition? - Answer✔✔-
fingerprint recognition is easily deceived
________ is a form of identification that identifies a person as being a member of a group. -
Answer✔✔-watch list matching
A ________ is a small device that plugs into a standard computer port to identify the owner. -
Answer✔✔-usb token
Page 1/7
, EMILLECT 2024/2025 ACADEMIC YEAR ©2024 EMILLECT. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER, 2024
The strongest form of authentication is ________. - Answer✔✔-cryptographic authentication
A ________ card stores authentication data. - Answer✔✔-both magnetic stripe and smart
Which of the following statements accurately describes iris recognition? - Answer✔✔-iris
technology is expensive
The most widely used form of biometrics is ________. - Answer✔✔-fingerprint scanning
In directory servers, information is organized ________. - Answer✔✔-hierarchically
LDAP can be used ________. - Answer✔✔-both to update information in the directory server
and to retrieve data from the directory server
Replication between a domain controller in a child domain and a domain controller in its parent
domain is ________. - Answer✔✔-partial
Iris recognition technology is ________ and ________. - Answer✔✔-expensive, has low FARs
The standard for sending security assertions is ________. - Answer✔✔-SAML
________ is the process of collecting information about the activities of each individual in log
files for immediate and later analysis. - Answer✔✔-auditing
Which of the following statements is true about log files? - Answer✔✔-all of these
Directory servers from different vendors are synchronized through ________. - Answer✔✔-
none of these
CAs distribute public keys ________. - Answer✔✔-in digital certificates
Page 2/7