Chapter 5 ■ dentity and Access Management (Domain 5)I 121
- Match each of the numbered authentication techniques with the appropriate lettered cat-
egory. Each technique should be matched with exactly one category. Each category may be
used once, more than once, or not at all.
Authentication technique
- Password
- ID card
- Retinal scan
- Smartphone token
- Fingerprint analysis
Category
A. Something you have
B. Something you know
C. Something you are
- Which of the following is not an access control layer?
A. Physical
B. Policy
C. Administrative
D. Tech n ica l
- Ben uses a software-based token that changes its code every minute. What type of token is
he using?
A. Asynchronous
B. Smart card
C. Synchronous
D. Static - What type of token-based authentication system uses a challenge/response process in
which the challenge has to be entered on the token?
A. Asynchronous
B. Smart card
C. Synchronous
D. RFID