You are comparing different types of authentication. Of the following
choices, which one uses multifactor authentication?
Sec + CH.2 Pre-Assessment
Quiz
•
Computers
•
Professional Development
•
Hard
Prem Jadhwani
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are comparing different types of authentication. Of the following
choices, which one uses multifactor authentication?
A system that requires users to enter a username and password
A system that checks an employee’s fingerprint and does a vein
scan
A cipher door lock that requires employees to enter a code to open
the door
A system that requires users to have a smart card and a PIN
Answer explanation
D is correct. A system that requires users to have a smart card and a
personal identification number (PIN) uses multifactor authentication or
two-factor authentication. The card is in the something you have factor, and
the PIN is in the something you know factor. A username provides
identification, and a password is in the something you know factor,
providing single-factor authentication. Fingerprints and vein scans are both
in the something you are factor, providing single-factor authentication. A
code for a cipher door lock is in the something you know factor, providing
single-factor authentication. See Chapter 2.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The chief information officer (CIO) at your organization suspects
someone is entering the data center after normal working hours and stealing
sensitive data. Which of the following actions can prevent this?
Upgrade the CCTV system.
Require smart cards to enter the data center.
Implement time-based logins.
Enable advanced auditing.
Answer explanation
C is correct. Time-based logins (sometimes called time-of-day
restrictions) would prevent this. They would prevent anyone from logging
in after normal working hours and accessing sensitive data. All of the other
answers can detect suspicious behavior, but they wouldn’t prevent the users
from logging in after normal working hours and stealing the data. See
Chapter 2.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A SQL database server was recently attacked. Cybersecurity
investigators discovered the attack was self-propagating through the
network. When it found the database server, it used well-known credentials
to access the database. Which of the following would be the BEST action to
prevent this from occurring again?
Change the default application password.
This describes a worm.
Implement 2FA.
Conduct a code review.
Answer explanation
A is correct. The default application password for the SQL server
should be changed. Some SQL Server software implementations can have a
default blank password for the SA account (the System Administrator
account), and these default credentials are well-known. While the scenario
describes a worm because it is self-propagating, the question is asking for
the best preventive action to take. Using two-factor authentication (2FA) is
a good practice for users, but it isn’t always feasible for application
passwords. A code review can detect flaws and vulnerabilities in internally
developed applications, but SQL Server is Microsoft software. See Chapter
2.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
You are reviewing security controls and their usefulness. You notice that
account lockout policies are in place. Which of the following attacks will
these policies thwart? (Select TWO.)
Brute force
DNS poisoning
Dictionary
Replay
Buffer overflow
Answer explanation
A and C are correct. Brute force and dictionary attacks attempt to guess
passwords, but an account lockout control locks an account after the wrong
password is guessed too many times. The other attacks are not password
attacks, so they aren’t mitigated using account lockout controls. Domain
Name System (DNS) poisoning attempts to redirect web browsers to
malicious URLs. Replay attacks attempt to capture packets to impersonate
one of the parties in an online session. Buffer overflow attacks attempt to
overwhelm online applications with unexpected code or data. See Chapters
2 and 10.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
IT administrators created a VPN for employees to use while working
from home. The VPN is configured to provide AAA services. Which of the
following would be presented to the AAA system for identification?
Password
Permissions
Username identification
Tunneling certificate
Hardware token
Answer explanation
C is correct. Users would typically enter a username as identification
for an authentication, authorization, and accounting (AAA) system. Users
would provide a password as proof that the claimed identity (the username)
is theirs. The password provides authentication. Users are assigned
permissions based on their proven identity, but the permissions do not
provide authentication. The virtual private network (VPN) would encrypt
traffic sent via the VPN tunnel, and this traffic may be encrypted with the
use of a certificate. However, this is not called a tunneling certificate, and
the certificate used for encryption does not provide identification. A
hardware token is often used as an additional method of authentication, but
it does not provide identification. See Chapter 2.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After a recent attack, security investigators discovered that attackers
logged on with an administrator account. They recommend implementing a
solution that will thwart this type of attack in the future. The solution must
support the following requirements:
Allow authorized users to access the administrator account
without knowing the password.
Allow authorized users to check out the credentials when
needed.
Log each time the credentials are used.
Automatically change the password.
Which of the following answers would meet these requirements?
Privileged access management
OpenID Connect
MAC scheme
MFA
Answer explanation
A is correct. A privileged access management system protects and limits
access to privileged accounts such as administrator accounts. OpenID
Connect is used for authentication and authorization on the Internet, not
internal networks. A mandatory access control (MAC) scheme uses labels
to control access, but it isn’t used to control access to administrator
accounts. Multifactor authentication (MFA) uses more than one factor of
authentication, but it doesn’t meet any of the requirements of this scenario.
See Chapter 2.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lisa wants to implement a secure authentication system on a website.
However, instead of collecting and storing user passwords, she wants to use
a third-party system. Which of the following is the BEST choice to meet
this goal?
SAML
Kerberos
SSH
OAuth
Answer explanation
A is correct. Security Assertion Markup Language (SAML) is a single
sign-on SSO solution that can use third-party websites, and it provides
authentication. Kerberos is an SSO solution used on internal networks such
as in Microsoft Active Directory domains. Secure Shell (SSH) is used for
remote administration. OAuth (think of this as Open Authorization) is used
for authorization, but the scenario wants a solution for authentication. See
Chapter 2.
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization is implementing an SDN. Management wants to use
an access control scheme that controls access based on attributes. Which of
the following is the BEST solution?
DAC
MAC
Role-BAC
ABAC
Answer explanation
D is correct. A software-defined network (SDN) typically uses an
attribute-based access control (ABAC) scheme. The ABAC scheme is
based on attributes that identify subjects and objects within a policy. A
discretionary access control (DAC) scheme has an owner, and the owner
establishes access for the objects. A mandatory access control (MAC)
scheme uses labels assigned to subjects and objects. A role-based access
control scheme uses roles or groups to assign rights and permissions. See
Chapter 2.
13 questions
CyberSecurity
Quiz
•
Professional Development
11 questions
Focus Group Knowledge Check September
Quiz
•
Professional Development
10 questions
ITF - Quiz 3.4 - Access Control and Protection
Quiz
•
Professional Development
10 questions
Initial Assessment - Cybersecurity Awareness
Quiz
•
9th Grade - Professio...
10 questions
ITF - Quiz 14.5 - Password Security and Management
Quiz
•
Professional Development
10 questions
Digital Etiquette Quiz
Quiz
•
Professional Development
10 questions
System Ethical Hacking
Quiz
•
Professional Development
10 questions
Practice Quiz
Quiz
•
Professional Development
15 questions
Character Analysis
Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
10 questions
American Flag
Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25
Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers
Quiz
•
6th - 8th Grade