1.
A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:
2.
In Mandatory Access Control, sensitivity labels attached to object contain what information?
3.
What are the components of an object's sensitivity label?
4.
What does it mean to say that sensitivity labels are "incomparable"?
5.
Which of the following is true about Kerberos?
6.
Which of the following is needed for System Accountability?
7.
What is Kerberos?
8.
The three classic ways of authenticating yourself to the computer security software are by something you know, by something you have, and by something:
9.
A timely review of system access audit records would be an example of which of the basic security functions?
10.
A confidential number used as an authentication factor to verify a user's identity is called a: