Cyber II | AAA & Authentication Intro by Mr. B

Cyber II | AAA & Authentication Intro by Mr. B

12th Grade

25 Qs

quiz-placeholder

Similar activities

Cyber Camps 2018 - Day 2 Review

Cyber Camps 2018 - Day 2 Review

6th - 12th Grade

24 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Unit 11: Cybersecurity

Unit 11: Cybersecurity

10th - 12th Grade

22 Qs

Pre TEST AIJ

Pre TEST AIJ

12th Grade

20 Qs

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

HTML and URL Quiz

HTML and URL Quiz

12th Grade

20 Qs

Cyber II | AAA & Authentication Intro by Mr. B

Cyber II | AAA & Authentication Intro by Mr. B

Assessment

Quiz

Computers

12th Grade

Medium

S4, S1

Standards-aligned

Created by

Cyber Professor - Mr. B

Used 6+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

What is the main means by which anti-virus software identifies infected files?

defintions

signatures

heuristic behavior

the infected files are in purple

2.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Usually the the first method of multifactor authentication is a strong password. Choose a common second method for authenication. (Choose the two best methods)

A Retna Scan

A thumb or finger print

a punch card

a school id card

3.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Media Image

You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts.

Which of the following models could this office be using? (Select two.)

Standalone

Client-server

Azure AD

Active Directory

Workgroup

Tags

S4

4.

FILL IN THE BLANK QUESTION

2 mins • 3 pts

True or False: As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target.

5.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

An attack with the intention to make the target system unavailable to legitimate users is called what type of attack?

Denial of Service

Ransomware

Spyware

Botnet

6.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

Media Image

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company.

Which command can you use to disable this account?

usermod -d joer

usermod -u joer

usermod -L joer

usermod -l joer

7.

MULTIPLE CHOICE QUESTION

2 mins • 3 pts

What authentication standard is used by active-duty US military personnel?

CAC

PIV

COTP

SIM

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?