288 Chapter 12 ■ Practice Test 4
- What type of access control is intended to discover unwanted or unauthorized activity by
providing information after the event has occurred?
A. Preventive
B. Corrective
C. Detective
D. Directive - Which one of the following presents the most complex decoy environment for an attacker
to explore during an intrusion attempt?
A. Honeypot
B. Darknet
C. Honeynet
D. Pseudo flaw
Ben’s organization is adopting biometric authentication for their high-security building’s
access control system. Using this chart, answer questions 3–5 about their adoption of the
technology.
FAR
FRR
A
B
Sensitivity
Percent
- Ben’s company is considering configuring their systems to work at the level shown by point
A on the diagram. What level are they setting the sensitivity to?
A. The FRR crossover
B. The FAR point
C. The CER
D. The CFR - At point B, what problem is likely to occur?
A. False acceptance will be very high.
B. False rejection will be very high.
C. False rejection will be very low.
D. False acceptance will be very low.