Which of these Authentication Concepts PROVE a users identity?
Security Plus 1-02

Quiz
•
Instructional Technology
•
Professional Development
•
Medium

Prem Jadhwani
Used 52+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Identification
Authentication
Authorization
Access
Answer explanation
Identification professes an identity.
Authentication proves an identity.
Authorization grants access to resources based on authentication.
Access just means you have access.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user name and password fall into which of these factors of authentication?
Something you are
Something you have
Something you know
Something you do
Answer explanation
These fall into something you know.
Something you do is a gesture on a touch screen.
Something you have is like a smart card.
Something you are is like your fingerprint.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which IT term is used for logging all activities to ensure there is clear evidence.
Note Taking
Log Keeping
Record Management
Accounting
Answer explanation
In Identity and Access Management, Accounting is the term used for logging all activities to ensure there is clear evidence.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A unit used to measure the average number of unauthorized users who are incorrectly verified as authorized users on a biometric security system.
False Acceptance Rate
False Rejection Rate
True Acceptance Rate
True Rejection Rate
Answer explanation
FAR - False Acceptance Rate is a way to measure how many people get into a place that aren't supposed to be allowed in. It identifies when a biometric security system allows an unauthorized user in due to an error, falsely saying they are authorized to go in.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which is an example of multi-factor authentication (MFA)?
Fingerprint and Smart Card
Username and Password
Retinal Scan and Fingerprint
Key Fob and time-based one-time password (TOTP)
Answer explanation
Fingerprint and Smart Card is something you are and something you have.
Every other option is the same category.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A time-stamped ticket-based system used for network authentication that runs over port 88.
TACACS+
Kubernetes
Kerberos
WPA2-Enterprise
Answer explanation
Kerberos is a network authentication protocol that runs over port 88 and uses a ticket granting service where the tickets will expire after a period of time. We authenticate with port 88.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What port does RADIUS (Remote Authentication Dial-In User Service) use?
389
1812
1701
22
Answer explanation
RADIUS uses port 1812.
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Module 1 - Modern Management

Quiz
•
Professional Development
15 questions
Cryptography Chap-1

Quiz
•
9th Grade - Professio...
15 questions
Importance of Logs

Quiz
•
Professional Development
20 questions
Core 1 Test Review

Quiz
•
Professional Development
17 questions
Security Plus 1-03

Quiz
•
Professional Development
20 questions
API Design Basic

Quiz
•
Professional Development
15 questions
BMW Recap

Quiz
•
Professional Development
20 questions
BCS Network Security Test 7

Quiz
•
University - Professi...
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade