Search Header Logo

CCSP-P1-F

Authored by kalki disuza

English

1st Grade

Used 1+ times

CCSP-P1-F
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

51 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the major difference between authentication and authorization?

A. Code verification/code implementation

B. Identity validation/access permission

C. Inverse incantation/obverse instantiation

D. User access/privileged access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Access should be based on .

A. Regulatory mandates

B. Business needs and acceptable risk

C. User requirements and management requests

D. Optimum performance and security provision

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All of the following are identity federation standards commonly found in use today except _______.

WS-Federation

OpenID

OAuth (Open Authorization)

Pretty Good Privacy (PGP)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a federation standard/protocol that does not rely on Simple t Object Access Protocol (SOAP), Security Assertion Markup Language (SAML), or Extensible Markup Language (XML)?

A. WS-Federation

B. OpenID Connect

C. Service Organization Control (SOC) 2

D. Open Web Application Security Project (OWASP)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication mechanisms typically include any or all of the following except .

A. Something you know

B. Someone you know

C. Something you have

D. Something you are

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following constitutes a multifactor authentication process or procedure?

A. Using an automated teller machine (ATM) to get cash with your credit or debit card

B. Using a password and personal identification number (PIN) to log into a website

C. Presenting a voice sample and fingerprint to access a secure facility

D. Displaying a birth certificate and a credit card

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A web application firewall (WAF) can understand and act on traffic.

A. Malicious

B. Simple Mail Transfer Protocol (SMTP)

C. Internet Control Message Protocol (ICMP)

D. Hypertext Transfer Protocol (HTTP)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?