Which of the following is a countermeasure related to access control?

Prepare for the DSAC Annex F Test. Use a variety of study methods such as flashcards and practice questions, each with detailed explanations and insights. Get thoroughly ready for your test!

Multiple Choice

Which of the following is a countermeasure related to access control?

Explanation:
The main idea being tested is how to enforce that only authorized people can reach resources. Biometric authentication systems are a strong countermeasure for access control because they verify identity using unique physical characteristics, such as fingerprints or facial features. This ties access to something inherent to the user, making it harder for someone else to impersonate you and enabling use as part of multi-factor authentication for additional protection. In practice, this helps ensure that granted access is truly to the right person, not just to someone who knows a password. Phishing emails, on the other hand, are a social engineering tactic that tries to steal credentials or trick users into revealing sensitive information; they don’t provide a direct mechanism to control who can access a system. Unencrypted data transfer creates risks of interception and exposure but does not restrict access itself. Public Wi‑Fi access describes a network condition that can introduce risk or exposure rather than offer a way to enforce who is allowed in.

The main idea being tested is how to enforce that only authorized people can reach resources. Biometric authentication systems are a strong countermeasure for access control because they verify identity using unique physical characteristics, such as fingerprints or facial features. This ties access to something inherent to the user, making it harder for someone else to impersonate you and enabling use as part of multi-factor authentication for additional protection. In practice, this helps ensure that granted access is truly to the right person, not just to someone who knows a password.

Phishing emails, on the other hand, are a social engineering tactic that tries to steal credentials or trick users into revealing sensitive information; they don’t provide a direct mechanism to control who can access a system. Unencrypted data transfer creates risks of interception and exposure but does not restrict access itself. Public Wi‑Fi access describes a network condition that can introduce risk or exposure rather than offer a way to enforce who is allowed in.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy