Search Header Logo

Cyber II | AAA & Authentication Intro by Mr. B

Authored by Cyber Professor - Mr. B

Computers

12th Grade

S4 covered

Used 7+ times

Cyber II | AAA & Authentication Intro by Mr. B
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

What is the main means by which anti-virus software identifies infected files?

defintions

signatures

heuristic behavior

the infected files are in purple

2.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Usually the the first method of multifactor authentication is a strong password. Choose a common second method for authenication. (Choose the two best methods)

A Retna Scan

A thumb or finger print

a punch card

a school id card

3.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Media Image

You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts.

Which of the following models could this office be using? (Select two.)

Standalone

Client-server

Azure AD

Active Directory

Workgroup

Tags

S4

4.

FILL IN THE BLANK QUESTION

2 mins • 3 pts

True or False: As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target.

5.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

An attack with the intention to make the target system unavailable to legitimate users is called what type of attack?

Denial of Service

Ransomware

Spyware

Botnet

6.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company.

Which command can you use to disable this account?

usermod -d joer

usermod -u joer

usermod -L joer

usermod -l joer

7.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

What authentication standard is used by active-duty US military personnel?

CAC

PIV

COTP

SIM

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers