Module 12 (Fundamentals of Cybersecurity)

Module 12 (Fundamentals of Cybersecurity)

University

10 Qs

quiz-placeholder

Similar activities

Cyber Authentication Methods Quiz

Cyber Authentication Methods Quiz

ITF - Authentication Factors 14.3

ITF - Authentication Factors 14.3

Computer Terminology

Computer Terminology

Security+ Authentication Technologies

Security+ Authentication Technologies

Module 12 (Fundamentals of Cybersecurity)

Module 12 (Fundamentals of Cybersecurity)

Assessment

Quiz

Computers

University

Easy

Created by

Kelly Gafford

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a traditional pillar of authentication?

Something you know

Something you have

Something you are

Somewhere you exhibit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common weakness of passwords as a form of authentication?

They are difficult to remember.

They require physical tokens.

They are often reused across multiple accounts.

They are too long and complex.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of a two-factor authentication (2FA) method?

Entering a password and then a code sent to your phone.

Using a fingerprint scanner to unlock your phone.

Answering a security question.

Using facial recognition to log into a computer.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary advantage of using biometrics for authentication?

Biometrics are easy to change if compromised.

Biometric data is impossible to fake.

Biometrics are unique to each individual.

Biometrics are less expensive than passwords.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of biometric is considered the most accurate but also the least common due to cost?

Fingerprint scanning

Facial recognition

Iris scanning

Voice recognition

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for analyzing a person's unique behavioral patterns for authentication?

Social authentication

Two-factor authentication

Behavioral biometrics

Geofencing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of "something you can do" authentication?

Typing your password quickly.

Drawing a specific pattern on a touchscreen.

Speaking a passphrase into a microphone.

Standing in a specific location.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?