Abac Security Plus
14 community-sourced questions and answers. Free — no login.
ABAC relies on the evaluation of several factors in order to function properly. Which option is not a primary factor?
Organizational roles and responsibility.
Match the form of ocular bio-metric to its particular characteristics.
Iris Scanning - More widely accepted as a commercial modality. Noninvasive, and can be performed at a distance. Scans the thin , circular, colored part of the eye. Uses infrared illumination camera technology to get images of the ocular details. Retina Scanning - More likely to be affected by disease. Scans the thin tissue compromised of neural cells in the back part of the eye.
Which statements are correct regarding discretionary access controls?
DAC allows the object owner to have control over granted access. DAC is easy to implement and operate. DAC aligns with the least privilege security principle.
Which statement is not true concerning fingerprint scanning bio-metrics?
Not a common bio-metric as the fingerprints tend to change over time.
What would be the best access model for a medical center where different categories of users such as doctor, RN, PA, technician, and receptionist need access assigned by an administrator based on the least privilege of their daily duties and responsibilities?
RBAC.
Which term describes a small hardware device that the owner carries to get authorized access to a system or service?
Token.
Database security should offer authorized and safe access for users and administrators while preserving the integrity of the data. Which option is not a key area of consideration?
Making sure that all data is stored in the cloud.
The Bell-LaPadula model is an example of what kind of access control methodology?
Mandatory Access Control (MAC).
Which behavioral bio-metric leverages the aural aspects of speech that diverge among people?
Speaker recognition.
The least privilege principle should be in place with file system security? Select if the statement is true or false.
True.
Which mechanism measures the probability that the bio-metric system will incorrectly accept an access effort by an unauthorized user?
FAR.
When presented with a certificate, the authentication server will at the minimum want to determine which of the following?
If the certificate is expired based on the timestamp. If the certificate has been revoked by CRL of OCSP. If the certificate is signed by a third-party trust point. If the client has presented a proof of possession.
Which option best represents the access control model that allows management access to a router from 6 am to 6 pm Monday through Friday, on particular virtual terminal lines that are configured using a time-based ACL?
Rule-based.
Which statement is false regarding facial recognition?
Is only used to identify individuals in video but not still images.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials