CompTIA Security+ Exam Prep - Question List

Select how would you like to study

226. Which of these biometric methods is considered the most accurate of the different biometric authentication types?
  1. Iris scan
  2. Retina scan
  3. Facial geometry
  4. Fingerprint scan
227. Olivia provided security features that control how users and systems communicate and interact with other systems and resources. What did Olivia create?
  1. Access Controls
  2. Access Limitations
  3. Control Accesses
  4. Limited Access
228. Once an organization determines it needs to have access control techniques and technologies in place, it must choose which kind. What kind uses specific rules that indicative what can and cannot happen between a subject and an object?
  1. Capability Table
  2. Context-based Access
  3. Rule-based Access
  4. Access Control List
229. What protocol combines the authentication and authorization functionality?
  1. Roaming Operations
  2. RADIUS
  3. TACACS
  4. Diameter
230. What method gives control of access to the people that are closer to the resources that may better understand who should and should not have access to certain files, data, and resources?
  1. Authentication Processes
  2. Access Control Authentication
  3. Decentralized Access Control Administration
  4. Access Implementation Methods

Select how would you like to study