Security Plus 1-02

Quiz
•
Instructional Technology
•
Professional Development
•
Medium

Prem Jadhwani
Used 52+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these Authentication Concepts PROVE a users identity?
Identification
Authentication
Authorization
Access
Answer explanation
Identification professes an identity.
Authentication proves an identity.
Authorization grants access to resources based on authentication.
Access just means you have access.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user name and password fall into which of these factors of authentication?
Something you are
Something you have
Something you know
Something you do
Answer explanation
These fall into something you know.
Something you do is a gesture on a touch screen.
Something you have is like a smart card.
Something you are is like your fingerprint.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which IT term is used for logging all activities to ensure there is clear evidence.
Note Taking
Log Keeping
Record Management
Accounting
Answer explanation
In Identity and Access Management, Accounting is the term used for logging all activities to ensure there is clear evidence.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A unit used to measure the average number of unauthorized users who are incorrectly verified as authorized users on a biometric security system.
False Acceptance Rate
False Rejection Rate
True Acceptance Rate
True Rejection Rate
Answer explanation
FAR - False Acceptance Rate is a way to measure how many people get into a place that aren't supposed to be allowed in. It identifies when a biometric security system allows an unauthorized user in due to an error, falsely saying they are authorized to go in.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which is an example of multi-factor authentication (MFA)?
Fingerprint and Smart Card
Username and Password
Retinal Scan and Fingerprint
Key Fob and time-based one-time password (TOTP)
Answer explanation
Fingerprint and Smart Card is something you are and something you have.
Every other option is the same category.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A time-stamped ticket-based system used for network authentication that runs over port 88.
TACACS+
Kubernetes
Kerberos
WPA2-Enterprise
Answer explanation
Kerberos is a network authentication protocol that runs over port 88 and uses a ticket granting service where the tickets will expire after a period of time. We authenticate with port 88.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What port does RADIUS (Remote Authentication Dial-In User Service) use?
389
1812
1701
22
Answer explanation
RADIUS uses port 1812.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
SD Review Week 1

Quiz
•
Professional Development
15 questions
SNAF Quiz 1

Quiz
•
Professional Development
20 questions
ISMS Assessment

Quiz
•
Professional Development
19 questions
5.1 run a program

Quiz
•
Professional Development
18 questions
SC - 300 Day- 3 and 4

Quiz
•
Professional Development
24 questions
BCS Network Security Test 6

Quiz
•
University - Professi...
22 questions
BCS Network Security Test 8

Quiz
•
University - Professi...
25 questions
Warm Up Game

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade