Yubico Top 5 Mobile Authentication Misconceptions

Yubico Top 5 Mobile Authentication Misconceptions

Professional Development

10 Qs

quiz-placeholder

Similar activities

Chapter 5: Network Security and Monitoring

Chapter 5: Network Security and Monitoring

University - Professional Development

15 Qs

Security Analyst Training Quiz

Security Analyst Training Quiz

Professional Development

10 Qs

MGNF- Class 3

MGNF- Class 3

Professional Development

10 Qs

Formative Assessment Part B: Developmental Disabilities

Formative Assessment Part B: Developmental Disabilities

Professional Development

10 Qs

Pardot Quiz Aug '21

Pardot Quiz Aug '21

Professional Development

9 Qs

Bridge Training Course

Bridge Training Course

Professional Development

10 Qs

Formative Assessment

Formative Assessment

Professional Development

12 Qs

Quiz - Data Fundamentals Quiz

Quiz - Data Fundamentals Quiz

Professional Development

14 Qs

Yubico Top 5 Mobile Authentication Misconceptions

Yubico Top 5 Mobile Authentication Misconceptions

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

Jessica Cabrera

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the most common types of MFA up to this time?

A. OTP/TOTP

B. Authenticator Apps

C. Push Apps

D. Built-in Authenticators

E. All of the answers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As discussed, how many percent (%)  of organizations continue to choose-mobile based authentication as their MFA form factor?

A. 50%

B. 51%

C. 52%

D. 53%

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False. Every mobile-based authentication can be hacked.

A. TRUE

B. FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of attacks that tricks users into giving up sensitive information such as credentials?

A. Phishing

B. Credential Stuffing

C. Brute Force Attack

D. MITM

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False. Mobile authentication is cost-effective compared to hardware-based authentication (security keys)

A. TRUE

B. FALSE

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

In what categories does Yubico’s YubiKeys protects? (Choose two)

A. Account takeover attacks

B. Malware attacks

C. Denial-of-service attacks

D. Supply-chain attacks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The choices below are security functions of YubiKey 5 Series except for one.

A. OpenPGP

B. PIV

C. FIDO U2F/2.0

D. OATH-OTP

E. Biometric Scanner

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?