Jasmine is creating a presentation. She wants to ensure the integrity and authenticity of the presentation. Which of the following will she use to accomplish the task?
Which of the following is the most secure method of authentication?
biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is becoming
more common in the business environment. It is the most secure method of authentication.
Answer option C is incorrect. Username and password is the least secure method of authentication in comparison of smart card and biometrics
authentication. Username and password can be intercepted.
Answer option A is incorrect. Smart card authentication is not as reliable as biometrics authentication.
Answer option B is incorrect. Anonymous authentication does not provide security as a user can log on to the system anonymously and he is
not prompted for credentials.
Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?
considerable loss of information systems resources. The chief objective of a disaster recovery plan is to provide an organized way to make
decisions if a disruptive event occurs.
Disaster recovery planning is a subset of a larger process known as business continuity planning and should include planning for resumption
of applications, data, hardware, communications (such as networking), and other IT infrastructure. A business continuity plan (BCP) includes
planning for non-IT related aspects such as key personnel, facilities, crisis communication, and reputation protection, and should refer to the
disaster recovery plan (DRP) for IT-related infrastructure recovery/continuity.
Answer option C is incorrect. Business Continuity Planning (BCP) is the creation and validation of a practiced logistical plan for how an
organization will recover and restore partially or completely interrupted critical (urgent) functions within a predetermined time after a disaster
or extended disruption. The logistical plan is called a business continuity plan.
Answer option D is incorrect. The Continuity Of Operation Plan (COOP) refers to the preparations and institutions maintained by the United
States government, providing survival of federal government operations in the case of catastrophic events. It provides procedures and
capabilities to sustain an organization's essential. COOP is the procedure documented to ensure persistent critical operations throughout any
period where normal operations are unattainable.
Answer option B is incorrect. A contingency plan is a plan devised for a specific situation when things could go wrong. Contingency plans are
often devised by governments or businesses who want to be prepared for anything that could happen. Contingency plans include specific
strategies and actions to deal with specific variances to assumptions resulting in a particular problem, emergency, or state of affairs. They also
include a monitoring process and 'triggers' for initiating planned actions. They are required to help governments, businesses, or individuals to
recover from serious incidents in the minimum time with minimum cost and disruption.
Which of the following password authentication schemes enables a user with a domain account to log on to a network once, using a
password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again?
password to each application. In SSO, a user can access all computer applications and systems where he has access permission without
entering multiple passwords. This reduces human error and systems failure and is therefore highly desirable. There are many commercial SSO
solutions available in the market. Some of them are as follows:
Central Authentication Service (CAS)
The Dutch NREN
CoSign
Enterprise Single Sign-On (E-SSO)
Web Single Sign-On (Web SSO)
Security Assertion Markup Language (SAML)
Direct SSO
Shibboleth
Answer option B is incorrect. A one-time password (OTP) is a password only valid for a single login session or transaction. OTP avoids a
number of shortcomings that are associated with traditional passwords. The most important shortcoming that is addressed by OTP is that OTP
is not vulnerable to replay attacks. If a potential intruder manages to record an OTP that was already used to log into a service or to conduct
a transaction, he will not be able to abuse it since it will be no longer valid.
Answer option D is incorrect. Kerberos is a secure protocol that supports ticketing authentication. A ticket is granted in response to a client
computer authentication request by the Kerberos authentication server, if the request contains valid user credentials and a valid Service
Principal Name (SPN). The ticket is then used by the client computer to access network resources. To enable Kerberos authentication, the
client and server computers must have a trusted connection to the domain Key Distribution Center (KDC). The task of KDC is to distribute
shared secret keys to enable encryption.
Answer option C is incorrect. In the dynamic password authentication scheme, passwords are changed after a specified time or time interval.
Which of the following are used to suppress gasoline and oil fires? Each correct answer represents a complete solution. Choose three.
Halon
Soda acid
CO2
Answer option A is incorrect. Water is used to suppress paper and wood fires.
Currently there are no comments in this discussion, be the first to comment!