1. Right Answer: A,B,C
Explanation: Two-factor authentication (T-FA) refers to any authentication protocol that requires two independent ways to establish identity and privileges. Common implementations of two-factor authentication use 'something you know' as one of the two factors, and use either 'something you have' or 'something you are' as the other factor. In fact, using more than one factor is also called strong authentication. On the other hand, using just one factor is considered by some weak authentication.
2. Right Answer: A,B,C,D
Explanation: Transactional systems provide a baseline necessary to measure and monitor contract performance and provide a method for appraising efficiency against possible areas of exposure. Effective transactional controls reduce administrative and material costs, shorten contract cycle times, enhance procurement decisions, and diminish legal risk.
3. Right Answer: A
Explanation: Authentication is the process of verifying a user's claimed identity. It is based on at least one of these three factors: Something you know, Something you have, orSomething you are.
4. Right Answer: A,B
Explanation: In physical security, access control refers to the practice of restricting entrance to authorized persons. Human means of enforcement include guard, bouncer, receptionist ... etc. Mechanical means may include locks and keys.
5. Right Answer: D
Explanation: Fault-tolerance enables a system to continue operating properly in the event of the failure of some parts of it. It avoids total breakdown, and is particularly sought- after in high-availability environment full of business critical systems.
Leave a comment