Security Plus 1-02

Security Plus 1-02

Professional Development

20 Qs

quiz-placeholder

Similar activities

Origin and evolution of computers

Origin and evolution of computers

Professional Development

17 Qs

Basic Cybersecurity Concepts 1

Basic Cybersecurity Concepts 1

Professional Development

25 Qs

Google Professional Architect 5 - 81 to 100

Google Professional Architect 5 - 81 to 100

Professional Development

20 Qs

Security+ Cengage Module6: Mobile and Embedded Device Security

Security+ Cengage Module6: Mobile and Embedded Device Security

Professional Development

20 Qs

PWCS Data Security and Compliance Quiz

PWCS Data Security and Compliance Quiz

Professional Development

15 Qs

All About The Internet

All About The Internet

5th Grade - Professional Development

15 Qs

Importance of Logs

Importance of Logs

Professional Development

15 Qs

Core 1 Test Review

Core 1 Test Review

Professional Development

20 Qs

Security Plus 1-02

Security Plus 1-02

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

Prem Jadhwani

Used 52+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of these Authentication Concepts PROVE a users identity?

Identification

Authentication

Authorization

Access

Answer explanation

Identification professes an identity.

Authentication proves an identity.

Authorization grants access to resources based on authentication.

Access just means you have access.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user name and password fall into which of these factors of authentication?

Something you are

Something you have

Something you know

Something you do

Answer explanation

These fall into something you know.

Something you do is a gesture on a touch screen.

Something you have is like a smart card.

Something you are is like your fingerprint.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which IT term is used for logging all activities to ensure there is clear evidence.

Note Taking

Log Keeping

Record Management

Accounting

Answer explanation

In Identity and Access Management, Accounting is the term used for logging all activities to ensure there is clear evidence.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A unit used to measure the average number of unauthorized users who are incorrectly verified as authorized users on a biometric security system.

False Acceptance Rate

False Rejection Rate

True Acceptance Rate

True Rejection Rate

Answer explanation

FAR - False Acceptance Rate is a way to measure how many people get into a place that aren't supposed to be allowed in. It identifies when a biometric security system allows an unauthorized user in due to an error, falsely saying they are authorized to go in.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which is an example of multi-factor authentication (MFA)?

Fingerprint and Smart Card

Username and Password

Retinal Scan and Fingerprint

Key Fob and time-based one-time password (TOTP)

Answer explanation

Fingerprint and Smart Card is something you are and something you have.

Every other option is the same category.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A time-stamped ticket-based system used for network authentication that runs over port 88.

TACACS+

Kubernetes

Kerberos

WPA2-Enterprise

Answer explanation

Kerberos is a network authentication protocol that runs over port 88 and uses a ticket granting service where the tickets will expire after a period of time. We authenticate with port 88.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What port does RADIUS (Remote Authentication Dial-In User Service) use?

389

1812

1701

22

Answer explanation

RADIUS uses port 1812.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?