Chapter	9.	Physical	Security	and	Authentication Models

Chapter 9. Physical Security and Authentication Models

University

35 Qs

quiz-placeholder

Similar activities

Digital Security

Digital Security

University

34 Qs

Chapter 6. Networking Protocols and Threats

Chapter 6. Networking Protocols and Threats

University

30 Qs

Authentication and Security Protocols

Authentication and Security Protocols

University

35 Qs

Cybersec 202011280611

Cybersec 202011280611

University

31 Qs

Sécurité du système d'exploitation

Sécurité du système d'exploitation

10th Grade - University

34 Qs

IPT 101 - Activity 2 (Bar Code and Scanner)

IPT 101 - Activity 2 (Bar Code and Scanner)

University

30 Qs

biometrics principle

biometrics principle

University

30 Qs

Computer Security & Privacy

Computer Security & Privacy

University

34 Qs

Chapter	9.	Physical	Security	and	Authentication Models

Chapter 9. Physical Security and Authentication Models

Assessment

Quiz

Computers, Other Sciences

University

Hard

Used 55+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the verification of a person’s identity?
Authorization
Accountability
Authentication
Password

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would fall into the category of “something a person Is”?
Passwords
Passphrases
Fingerprints
Smart cards

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following are good practices for tracking user identities? (Select the two best answers.)
Video cameras, Key card door access systems
Key card door access systems, Sign-in sheets
Sign-in sheets, Security guards
Security guards, Video cameras

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are two examples of common single sign-on authentication configurations? (Select the two best answers.)
Biometrics-based, Smart card-based
Multifactor authentication, Biometrics-based
Kerberos-based, Multifactor authentication
Smart card-based, Kerberos-based

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of two-factor authentication?
L2TP and Ipsec
Username and password
Thumprint and key card
Client and server

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main purpose of a physical access log?
To enable authorized employee access
To show who exited the facility
To show who entered the facility
To prevent unauthorized employee access

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a common criteria when authenticating users?
Something you do
Something you are
Something you know
Something you like

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?