CYB125 - Ch6

CYB125 - Ch6

University

40 Qs

quiz-placeholder

Similar activities

Encryption/Decryption

Encryption/Decryption

University

40 Qs

Revision Quiz

Revision Quiz

University

40 Qs

ET Unit 1 (TVL)

ET Unit 1 (TVL)

11th Grade - University

40 Qs

Wireless Network Security Quiz

Wireless Network Security Quiz

University

41 Qs

KISI-KISI CLOUD COMPUTING

KISI-KISI CLOUD COMPUTING

10th Grade - University

45 Qs

IST 166 Module 1

IST 166 Module 1

University

39 Qs

CPT EP Quiz 2 (C1 Computer Architecture, C10 Network Addresses)

CPT EP Quiz 2 (C1 Computer Architecture, C10 Network Addresses)

9th Grade - University

40 Qs

OWASP Noida Quiz

OWASP Noida Quiz

University

35 Qs

CYB125 - Ch6

CYB125 - Ch6

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Damon Vogel

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?

Answers the question "who is asking to access the asset?"

Verifies that requestors are who they claim to be

Grants or denies a requestor access and what they can do on a network

Determines how actions can be traced to an individual

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?

Remote Authentication Dial-In User Service (RADIUS)

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a logical access control?

Key for a lock

Password

Access card

Fence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of authentication includes smart cards?

Knowledge

Ownership

Location

Action

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of two-factor authentication (2FA)?

Smart card and personal identification number (PIN)

PIN and password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?

Dictionary attack

Rainbow table attack

Social engineering attack

Brute-force attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?

Enables a 30-day password change policy

Requires all passwords to contain at least eight alphanumeric characters

Mandates that no password includes words common in an English dictionary

Forbids a password being changed to any of the previous 10 passwords listed in the password history

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)