Search Header Logo

Authentication and Access Rights

Authored by Peter Astbury

Computers

9th - 12th Grade

7 Questions

Used 32+ times

Authentication and Access Rights
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these actions can be assigned as permissions in most OS?

overwrite

write

modify

read

execute

2.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

................. is the process of confirming the identity of a user.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The best approach is to give users as many rights as possible and scale back if there a problems later.

true

false

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Passphrases are better than passwords.

true

false

5.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

What advise would you give on choosing a secure password?

Use the same password for everything

Longer passwords are best

Use different kinds of characters

Write your passwords in a notebook

6.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

Using an eye scan or fingerprint as an authentication method is known as .............

7.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Two factor authentication requires .....

Drop down boxes for entering passwords

Only 2 characters of a password

A secure password

A code sent to another device

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?