Authentication and Authorization

Authentication and Authorization

Professional Development

10 Qs

quiz-placeholder

Similar activities

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

Security + Day 6 Review

Security + Day 6 Review

Professional Development

11 Qs

PASSWORD AND AUTHENTICATION PRESENTATION

PASSWORD AND AUTHENTICATION PRESENTATION

Professional Development

10 Qs

Deploy I Parte

Deploy I Parte

Professional Development

6 Qs

ICA TRIAD

ICA TRIAD

Professional Development

10 Qs

Komputer jaringan dasar

Komputer jaringan dasar

Professional Development

15 Qs

Security+ Study Guide-02 Understanding Identity & Access Mgnt

Security+ Study Guide-02 Understanding Identity & Access Mgnt

Professional Development

15 Qs

k8s-1

k8s-1

University - Professional Development

10 Qs

Authentication and Authorization

Authentication and Authorization

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Usama Yehia Ibrahim

Used 23+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a visit to a hosting center where your organization keeps some offsite servers, you see a door with an odd-looking panel next to it. You see people approaching the panel and placing their eyes into a hooded viewer. A few seconds after they’ve done this, the door unlocks. What type of biometric scanner might this be?

Voice recognition scanner

Retinal scanner

Fingerprint scanner

Facial recognition scanner

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You’ve spent the last week tweaking a fingerprint-scanning solution for your organization. Despite your best efforts, roughly 1 in 50 attempts will fail, even if the user is using the correct finger and their fingerprint is in the system. Your supervisor says 1 in 50 is “good enough” and tells you to move on to the next project. Your supervisor just defined which of the following for your fingerprint scanning system?

False rejection rate

False acceptance rate

Critical threshold

Failure acceptance criteria

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following algorithms uses a secret key with a current timestamp to generate a one-time password?

Hash-based Message Authentication Code

Date-Hashed Message Authorization Password

Time-based One-Time Password

Single sign-on

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

With regard to authentication, an access token falls into which factor category?

Something you are

Something you have

Something you know

Something you see

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a common form of hardware token?

Proximity card

Common access card

USB token

Iris scan

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

While depositing cash from a charity fundraiser at a local bank, you notice bank employees are holding up cards next to a panel near a door. A light on the panel turns green and the employees are able to open the door. The light on the panel is normally red. What type of electronic door control is this bank using?

Iris scanner

Hardware token

Proximity card

Symmetric key token

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

our colleague is telling you a story she heard about a way to trick fingerprint scanners using gummy bears. She heard that if you press a gummy bear against an authorized user’s finger, you can then use that gummy bear as their fingerprint to fool a fingerprint scanner. If this works, the result is an example of which of the following?

False negative

False positive

Crossover positive

Crossover negative

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?