
CYB125 - Ch6

Quiz
•
Information Technology (IT)
•
University
•
Hard

Damon Vogel
Used 1+ times
FREE Resource
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?
Answers the question "who is asking to access the asset?"
Verifies that requestors are who they claim to be
Grants or denies a requestor access and what they can do on a network
Determines how actions can be traced to an individual
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?
Remote Authentication Dial-In User Service (RADIUS)
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of a logical access control?
Key for a lock
Password
Access card
Fence
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of authentication includes smart cards?
Knowledge
Ownership
Location
Action
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of two-factor authentication (2FA)?
Smart card and personal identification number (PIN)
PIN and password
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?
Dictionary attack
Rainbow table attack
Social engineering attack
Brute-force attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?
Enables a 30-day password change policy
Requires all passwords to contain at least eight alphanumeric characters
Mandates that no password includes words common in an English dictionary
Forbids a password being changed to any of the previous 10 passwords listed in the password history
Create a free account and access millions of resources
Similar Resources on Wayground
36 questions
CYB125 - Ch3

Quiz
•
University
42 questions
Cyber Security Basics

Quiz
•
University
40 questions
Encryption/Decryption

Quiz
•
University
40 questions
Revision Quiz

Quiz
•
University
41 questions
Wireless Network Security Quiz

Quiz
•
University
40 questions
Quiztronic

Quiz
•
University
45 questions
KISI-KISI CLOUD COMPUTING

Quiz
•
10th Grade - University
40 questions
ET Unit 1 (HUMSS)

Quiz
•
11th Grade - University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade