What is authorization creep and what is the best defense against it?
Paul has been handed two different smart cards and is told that one is a combicard and one is a hybrid card. What is the difference between the two?
Which of the following is a true statement pertaining to the different type ofsmart cards and their characteristics?
A passphrase is turned into a virtual password, but what exactly is a virtual password?
At work Joans two network engineers are in a passionate debate over the valueof a soft token versus a hard token device. Which of the following best describes aPage 2cess trol-P2.txtsoft token?
Todd has been asked by the security officer to purchase a counter-basedauthentication system. Which of the following best describes what this type ofsystem is?
Two companies need to exchange data between the company databases. Both organizations use different database management systems that do not support directcommunications or replication. One company will need to export the data from its database and provide it to the other in a way that is consumable by the other company. These companies should ensure that their database management software supports which of the following?
What is a salt and what is it used for in a Linux or Unix system?
Syskey is a technology provided and used in Microsoft Windows environments. Whatis Syskey and what is its importance?
When purchasing a biometric system, one of the considerations that should bereviewed is the processing speed. Which of the following best describes what it ismeant by processing?