Security Science Quiz: January
Test your security knowledge with SSI’s Security Science Quiz!
10. Baud rate, data bits, parity, stop bits and flow control are all examples of where you would find:
- The RS232 protocol
- The RS485 protocol
- Communication settings
- Emulation settings
ANSWER KEY
- A
- D
- B
- C
- C
- A
- A
- A
- B
- C
- A
- C
11. Fault generation, microprobing and electromagnetic analysis are all examples of attacks on:
- Smart cards
- Memory cards
- SD cards
- UL 2050 cards
12. The means of restricting access to information based on the identity of each user and/ or their membership in certain groups, and access decisions typically from authorizations granted to a user based on credentials that he/ she presented at the time of authentication (i.e. user name, password, hardware/software token) is known as:
- Mandatory access control
- Role-based access control
- Discretionary access control
- Attribute-based access control
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.
A FREE subscription to the top resource for security and integration industry will prove to be invaluable.