An area to which access is controlled by retina scan is protected by which of the following security measure types?
A. Two-factor authentication
B. Biometric
C. Cipher locks
D. Optical reader
E. Proximity reader
CompTIA exam questions
An area to which access is controlled by retina scan is protected by which of the following security measure types?
A. Two-factor authentication
B. Biometric
C. Cipher locks
D. Optical reader
E. Proximity reader
A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?
A. Install host-based anti-malware software
B. Implement MAC filtering on all wireless access points
C. Add an implicit deny to the core router ACL
D. Block port 80 outbound on the company firewall
E. Require users to utilize two-factor authentication
A company has decided that all remote users need to use two-factor authentication to increase security. Several remote users have reported losing the RSA token and have replaced it several times. Which of the following is the solution for these users?
A. Use biometrics instead of the RSA token.
B. Remove the RSA token requirement for any user that has lost an RSA token.
C. Give the users with lost RSA tokens RFID badges instead.
D. Attach the RSA token to the lid of the laptop.
In order to establish a VPN to a company firewall, Peter, a technician needed to have an RSA token and provide a user name and password to connect to the main office. This is an example of:
A. Privacy filters.
B. Extensive security.
C. Two-factor authentication.
D. Basic authentication.
A company decides to implement two-factor authentication on all of the company computers. In addition to a user password, which of the following is a commonly used item to implement two-factor authentication?
A. Retinal scanner
B. Key Lock
C. RSA token
D. Privacy Filter