Cyber II | AAA & Authentication Intro by Mr. B

Cyber II | AAA & Authentication Intro by Mr. B

12th Grade

25 Qs

quiz-placeholder

Similar activities

UH 1 Teknologi wan

UH 1 Teknologi wan

12th Grade

20 Qs

Database&Relation

Database&Relation

12th Grade

20 Qs

Data structure test1

Data structure test1

12th Grade

20 Qs

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

10th - 12th Grade

20 Qs

TEST1.PY

TEST1.PY

10th Grade - University

20 Qs

Berpikir Komputasional

Berpikir Komputasional

9th - 12th Grade

20 Qs

Cyber II | AAA & Authentication Intro by Mr. B

Cyber II | AAA & Authentication Intro by Mr. B

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

S4, S1

Standards-aligned

Created by

Cyber Professor - Mr. B

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

What is the main means by which anti-virus software identifies infected files?

defintions

signatures

heuristic behavior

the infected files are in purple

2.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Usually the the first method of multifactor authentication is a strong password. Choose a common second method for authenication. (Choose the two best methods)

A Retna Scan

A thumb or finger print

a punch card

a school id card

3.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Media Image

You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts.

Which of the following models could this office be using? (Select two.)

Standalone

Client-server

Azure AD

Active Directory

Workgroup

Tags

S4

4.

FILL IN THE BLANK QUESTION

2 mins • 3 pts

True or False: As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target.

5.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

An attack with the intention to make the target system unavailable to legitimate users is called what type of attack?

Denial of Service

Ransomware

Spyware

Botnet

6.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company.

Which command can you use to disable this account?

usermod -d joer

usermod -u joer

usermod -L joer

usermod -l joer

7.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

What authentication standard is used by active-duty US military personnel?

CAC

PIV

COTP

SIM

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?