
CYB125 - Ch6

Quiz
•
Information Technology (IT)
•
University
•
Hard

Damon Vogel
Used 1+ times
FREE Resource
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?
Answers the question "who is asking to access the asset?"
Verifies that requestors are who they claim to be
Grants or denies a requestor access and what they can do on a network
Determines how actions can be traced to an individual
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?
Remote Authentication Dial-In User Service (RADIUS)
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of a logical access control?
Key for a lock
Password
Access card
Fence
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of authentication includes smart cards?
Knowledge
Ownership
Location
Action
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of two-factor authentication (2FA)?
Smart card and personal identification number (PIN)
PIN and password
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?
Dictionary attack
Rainbow table attack
Social engineering attack
Brute-force attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?
Enables a 30-day password change policy
Requires all passwords to contain at least eight alphanumeric characters
Mandates that no password includes words common in an English dictionary
Forbids a password being changed to any of the previous 10 passwords listed in the password history
Create a free account and access millions of resources
Similar Resources on Wayground
40 questions
TIK CLASS 7

Quiz
•
7th Grade - University
45 questions
Ujian Akhir Semester 1

Quiz
•
8th Grade - University
36 questions
CYB125 - Ch3

Quiz
•
University
42 questions
Cyber Security Basics

Quiz
•
University
45 questions
IT2112 Networking 1 Quiz 1

Quiz
•
University
43 questions
MGMT 2080 - Exam 2

Quiz
•
University
40 questions
QUIZ SA 314

Quiz
•
University
40 questions
Quiztronic

Quiz
•
University
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
10 questions
Chaffey

Quiz
•
9th - 12th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
22 questions
6-8 Digital Citizenship Review

Quiz
•
6th - 8th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade