Search Header Logo

CYB125 - Ch6

Authored by Anonymous Anonymous

Information Technology (IT)

University

Used 1+ times

CYB125 - Ch6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?

Answers the question "who is asking to access the asset?"

Verifies that requestors are who they claim to be

Grants or denies a requestor access and what they can do on a network

Determines how actions can be traced to an individual

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?

Remote Authentication Dial-In User Service (RADIUS)

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a logical access control?

Key for a lock

Password

Access card

Fence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of authentication includes smart cards?

Knowledge

Ownership

Location

Action

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of two-factor authentication (2FA)?

Smart card and personal identification number (PIN)

PIN and password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?

Dictionary attack

Rainbow table attack

Social engineering attack

Brute-force attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?

Enables a 30-day password change policy

Requires all passwords to contain at least eight alphanumeric characters

Mandates that no password includes words common in an English dictionary

Forbids a password being changed to any of the previous 10 passwords listed in the password history

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?