Chapter	9.	Physical	Security	and	Authentication Models

Chapter 9. Physical Security and Authentication Models

University

35 Qs

quiz-placeholder

Similar activities

City and Guilds Award in Mobile and Operating System

City and Guilds Award in Mobile and Operating System

12th Grade - Professional Development

30 Qs

IAS CH1 QUIZ

IAS CH1 QUIZ

University

35 Qs

JCE-CSE-Quiz

JCE-CSE-Quiz

University

30 Qs

IT Essentials Ch 12 Review - Security

IT Essentials Ch 12 Review - Security

University

30 Qs

Cloud

Cloud

University

35 Qs

Chapter10-Routing

Chapter10-Routing

University

38 Qs

biometrics principle

biometrics principle

University

30 Qs

 IAS 2 Security Architecture and Design Quiz 3

IAS 2 Security Architecture and Design Quiz 3

University

35 Qs

Chapter	9.	Physical	Security	and	Authentication Models

Chapter 9. Physical Security and Authentication Models

Assessment

Quiz

Computers, Other Sciences

University

Hard

Used 55+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the verification of a person’s identity?
Authorization
Accountability
Authentication
Password

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would fall into the category of “something a person Is”?
Passwords
Passphrases
Fingerprints
Smart cards

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following are good practices for tracking user identities? (Select the two best answers.)
Video cameras, Key card door access systems
Key card door access systems, Sign-in sheets
Sign-in sheets, Security guards
Security guards, Video cameras

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are two examples of common single sign-on authentication configurations? (Select the two best answers.)
Biometrics-based, Smart card-based
Multifactor authentication, Biometrics-based
Kerberos-based, Multifactor authentication
Smart card-based, Kerberos-based

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of two-factor authentication?
L2TP and Ipsec
Username and password
Thumprint and key card
Client and server

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main purpose of a physical access log?
To enable authorized employee access
To show who exited the facility
To show who entered the facility
To prevent unauthorized employee access

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a common criteria when authenticating users?
Something you do
Something you are
Something you know
Something you like

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?