
Security+ Identity and Account Types
Authored by J. Hines
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following options best defines the concept of "Single Sign-On" (SSO) in the context of identity and account types?
A method that grants users unrestricted access to all organizational resources without any security checks.
A security feature that requires users to enter their credentials multiple times to access different applications or resources.
An authentication process that requires users to verify their identity using multiple factors, such as passwords, biometrics, and security tokens.
A system that allows users to authenticate once and access multiple applications or resources without re-entering their credentials.
A technology that encrypts user credentials to prevent unauthorized access to sensitive information.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT an example of a user account type commonly used in an organization?
Standard User
Guest
Superuser
Administrator
Manager
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the concept of least privilege in the context of account types?
Allowing users to bypass security controls and protocols.
Allowing users to have unlimited access to all resources and system settings.
Assigning the same level of access rights to all users regardless of their job responsibilities.
Giving users administrative access to all resources in the organization.
Limiting user access rights to only the minimum necessary privileges to perform their job functions.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following technologies provides a mechanism for securely authenticating users by using a combination of public keys and digital certificates?
Public Key Infrastructure (PKI)
Lightweight Directory Access Protocol (LDAP)
Single Sign-On (SSO)
Secure Socket Layer (SSL)
Kerberos
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a strong authentication factor?
Something you know (e.g., password)
Something you are (e.g., fingerprint)
Something you see (e.g., CAPTCHA)
Something you do (e.g., typing pattern)
Something you have (e.g., ID card)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following authentication methods uses a unique physical characteristic, such as fingerprints or iris scan, to verify a user's identity?
Biometric authentication
Smart card authentication
Two-factor authentication
Knowledge-based authentication
Token-based authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of account types, what does the term "access control list" (ACL) refer to?
A list of revoked security certificates for user accounts.
A list of previous login attempts made by a user.
A list of users who are authorized to access a specific file or resource.
A list of allowed network protocols and services for a user account.
A list of user accounts with system administrative privileges.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?