Authentication and Control

Authentication and Control

9th - 12th Grade

6 Qs

quiz-placeholder

Similar activities

Know thy Peer-to-Peer

Know thy Peer-to-Peer

12th Grade

10 Qs

MIL March 8, 2023

MIL March 8, 2023

12th Grade

10 Qs

Access - Lesson 14

Access - Lesson 14

9th - 12th Grade

10 Qs

ICT 10 : Introduction to Adobe Illustrator(CS5)

ICT 10 : Introduction to Adobe Illustrator(CS5)

10th Grade

10 Qs

Ôn lại kiến thức  Lớp 3 T13

Ôn lại kiến thức Lớp 3 T13

1st - 10th Grade

10 Qs

Evaluación Final UNDECIMO 11

Evaluación Final UNDECIMO 11

11th Grade

10 Qs

XI_осн_веб_кон

XI_осн_веб_кон

9th - 12th Grade

10 Qs

Authentication and Control

Authentication and Control

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Quintasia Hurt

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user logs in and provides a password and a token ID value. This is an example of:

biometric login

hash value

one-time password

multi-factor authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The accounting department supervisor made the decision to allow an employee more access to accounting data than the user previously had. What level of access does this represent?

Mandatory Access Control (MAC)

Discretionary Access Control (DAC)

Role-Based Access Control (RBAC)

rule-based access control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes eliminating potential threats?

attack surfacing

policy implementation

hardening a system

hashing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A printer is considered which type of object in a directory tree?

leaf

LDAP

OU

CN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does the Enforce Password History setting help create a strong password strategy?

It prevents users from ever reusing a previous password.

It prevents users from adding numbers to the end of a previous password.

It prevents users from using a previous password for a specified number of changes

It prevents passwords that are already in from being used by others.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security strategy is most effective in preventing a normal user from automatically installing software on a computer?

Grant the user only read and execute permissions to the computer.

Set an appropriate UAC level.

Join the computer to the network domain

Do not allow share permissions.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?