Search Header Logo

Security+ Identity and Account Types

Authored by J. Hines

Computers

Professional Development

Used 3+ times

Security+ Identity and Account Types
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following options best defines the concept of "Single Sign-On" (SSO) in the context of identity and account types?

A method that grants users unrestricted access to all organizational resources without any security checks.
A security feature that requires users to enter their credentials multiple times to access different applications or resources.
An authentication process that requires users to verify their identity using multiple factors, such as passwords, biometrics, and security tokens.
A system that allows users to authenticate once and access multiple applications or resources without re-entering their credentials.
A technology that encrypts user credentials to prevent unauthorized access to sensitive information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an example of a user account type commonly used in an organization?

Standard User
Guest
Superuser
Administrator
Manager

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the concept of least privilege in the context of account types?

Allowing users to bypass security controls and protocols.
Allowing users to have unlimited access to all resources and system settings.
Assigning the same level of access rights to all users regardless of their job responsibilities.
Giving users administrative access to all resources in the organization.
Limiting user access rights to only the minimum necessary privileges to perform their job functions.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technologies provides a mechanism for securely authenticating users by using a combination of public keys and digital certificates?

Public Key Infrastructure (PKI)
Lightweight Directory Access Protocol (LDAP)
Single Sign-On (SSO)
Secure Socket Layer (SSL)
Kerberos

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a strong authentication factor?

Something you know (e.g., password)
Something you are (e.g., fingerprint)
Something you see (e.g., CAPTCHA)
Something you do (e.g., typing pattern)
Something you have (e.g., ID card)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following authentication methods uses a unique physical characteristic, such as fingerprints or iris scan, to verify a user's identity?

Biometric authentication
Smart card authentication
Two-factor authentication
Knowledge-based authentication
Token-based authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of account types, what does the term "access control list" (ACL) refer to?

A list of revoked security certificates for user accounts.
A list of previous login attempts made by a user.
A list of users who are authorized to access a specific file or resource.
A list of allowed network protocols and services for a user account.
A list of user accounts with system administrative privileges.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?