IT CertificationsAnswer Key

Abac Security Plus

14 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

ABAC relies on the evaluation of several factors in order to function properly. Which option is not a primary factor?

ANSWER

Organizational roles and responsibility.

QUESTION 2

Match the form of ocular bio-metric to its particular characteristics.

ANSWER

Iris Scanning - More widely accepted as a commercial modality. Noninvasive, and can be performed at a distance. Scans the thin , circular, colored part of the eye. Uses infrared illumination camera technology to get images of the ocular details. Retina Scanning - More likely to be affected by disease. Scans the thin tissue compromised of neural cells in the back part of the eye.

QUESTION 3

Which statements are correct regarding discretionary access controls?

ANSWER

DAC allows the object owner to have control over granted access. DAC is easy to implement and operate. DAC aligns with the least privilege security principle.

QUESTION 4

Which statement is not true concerning fingerprint scanning bio-metrics?

ANSWER

Not a common bio-metric as the fingerprints tend to change over time.

QUESTION 5

What would be the best access model for a medical center where different categories of users such as doctor, RN, PA, technician, and receptionist need access assigned by an administrator based on the least privilege of their daily duties and responsibilities?

ANSWER

RBAC.

QUESTION 6

Which term describes a small hardware device that the owner carries to get authorized access to a system or service?

ANSWER

Token.

QUESTION 7

Database security should offer authorized and safe access for users and administrators while preserving the integrity of the data. Which option is not a key area of consideration?

ANSWER

Making sure that all data is stored in the cloud.

QUESTION 8

The Bell-LaPadula model is an example of what kind of access control methodology?

ANSWER

Mandatory Access Control (MAC).

QUESTION 9

Which behavioral bio-metric leverages the aural aspects of speech that diverge among people?

ANSWER

Speaker recognition.

QUESTION 10

The least privilege principle should be in place with file system security? Select if the statement is true or false.

ANSWER

True.

QUESTION 11

Which mechanism measures the probability that the bio-metric system will incorrectly accept an access effort by an unauthorized user?

ANSWER

FAR.

QUESTION 12

When presented with a certificate, the authentication server will at the minimum want to determine which of the following?

ANSWER

If the certificate is expired based on the timestamp. If the certificate has been revoked by CRL of OCSP. If the certificate is signed by a third-party trust point. If the client has presented a proof of possession.

QUESTION 13

Which option best represents the access control model that allows management access to a router from 6 am to 6 pm Monday through Friday, on particular virtual terminal lines that are configured using a time-based ACL?

ANSWER

Rule-based.

QUESTION 14

Which statement is false regarding facial recognition?

ANSWER

Is only used to identify individuals in video but not still images.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials