C845 Information Systems Security: Chapter 2
Questions with Correct Answers | Updated
(100% Correct Answers)
IAM (Access management) programs Answer: Control physical and
logical access to information, systems, devices, and facilities
Access control process steps Answer: Identification, Authentication,
Authorization
Accounting Function Answer: Tracks user activity
AAA Answer: Combines Authentication, Authorization, and
Accounting
Access Cards Answer: Serve as proof of employment and allow
access to certain areas/systems
Stripe Card Answer: Has a stripe on the back and is swiped for use
Smart Card Answer: Contains a chip and is inserted into a reader or
held up for magnetic unlocking
Biometrics Answer: Uses unique personal characteristics for
authentication
Fingerprint Scanners Answer: Biometric devices that scan
fingerprints for authentication
© 2025 All rights reserved
, 2
Eye Scans Answer: Biometric devices that scan eye patterns or
blood vessels in the retina
Voiceprint Matching Answer: Biometric device that matches
voiceprints for authentication
Facial Recognition Answer: Biometric device that recognizes faces
for authentication
Vein Analysis Answer: Biometric device that analyzes veins for
authentication
Hand Analysis Answer: Biometric device that analyzes hands for
authentication
Gait Analysis Answer: Analyzes walking style for authentication
Registration Steps Answer: Request, Approval, Identity Proofing,
Issuance
Identity Proofing Steps Answer: Photo Identification, Fingerprinting,
Background Checks
Something you know Answer: Authentication method, typically a
password
Something you are Answer: Biometric authentication method
© 2025 All rights reserved