Answer the following statements true (T) or false (F)
1. For network based user authentication the most important methods involve cryptographic keys and something the individual possesses, such as a smart card.
2. There are a variety of problems including dealing with false positives and false negatives, user acceptance, cost, and convenience with respect to biometric authenticators.
3. Any timestamp based procedure must allow for a window of time sufficiently large enough to accommodate network delays yet sufficiently small to minimize the opportunity for attack.
4. An e-mail message should be encrypted such that the mail handling system is not in possession of the decryption key.
5. Because there are no potential delays in the e-mail process, timestamps are extremely useful.
1. FALSE
2. TRUE
3. TRUE
4. TRUE
5. FALSE
You might also like to view...
Which of the following statements creates a tuple containing two strings, an int and a double?
a. tuple
Which of the following statements is false?
a. A common way to perform synchronization is to use Java’s built-in monitors. b. Every object has a monitor and a monitor lock (or intrinsic lock). c. A monitor ensures that its object’s monitor lock is held by a maximum of two threads at a time. d. Monitors and monitor locks can be used to enforce mutual exclusion.
(Reaction Time/Reaction Precision Tester) Create a Web page that moves an image around the screen. The user moves the mouse to catch and click on the shape. The shape’s speed and size can be varied. Keep statistics on how much time the user typically takes to catch a shape of a given size. The user will probably have more difficulty catching faster-moving, smaller shapes.
What will be an ideal response?
Why might an organization be required to undergo a security audit?
What will be an ideal response?