32. In electronic authentication, which of the following is used to verify proof-of-possession of registered devices or identifiers?
a.
Lookup secret tokenb.
Out-of-band tokenc.
Token lock-up featured.
Physical security mechanism33. In electronic authentication, which of the following are examples of weakly bound credentials?
1.
Unencrypted password files2.
Signed password files3.
Unsigned public key certificates4.
Signed public key certificatesa.
1 onlyb.
1 and 3c.
1 and 4d.
2 and 434. In electronic authentication, which of the following are examples of strongly bound credentials?
1.
Unencrypted password files2.
Signed password files3.
Unsigned public key certificates4.
Signed public key certificatesa.
1 onlyb.
1 and 3c.
1 and 4d.
2 and 435. In electronic authentication, which of the following can be used to derive, guess, or crack the value of the token secret or spoof the possession of the token?
a.
Private credentialsb.
Public credentialsc.
Paper credentialsd.
Electronic credentialsPublic credentials are shared widely, do not lead to an exposure of the token secret, and have little or no confidentiality requirements. Paper credentials are documents that attest to the identity of an individual (e.g., passports, birth certificates, and employee identity cards) and are based on written signatures, seals, special papers, and special inks. Electronic credentials bind an individual’s name to a token with the use of X.509 certificates and Kerberos tickets.
36. Authorization controls are a part of which of the following?
a.
Directive controlsb.
Preventive controlsc.
Detective controlsd.
Corrective controlsDirective controls are broad-based controls to handle security incidents, and they include management’s policies, procedures, and directives. Detective controls enhance security by monitoring the effectiveness of preventive controls and by detecting security incidents where preventive controls were circumvented. Corrective controls are procedures to react to security incidents and to take remedial actions on a timely basis. Corrective controls require proper planning and preparation as they rely more on human judgment.