CYB125 - Ch6

CYB125 - Ch6

University

40 Qs

quiz-placeholder

Similar activities

Week 9 - PART 2 | Active Directory Quiz

Week 9 - PART 2 | Active Directory Quiz

University

38 Qs

Дилнура

Дилнура

University

35 Qs

TOPIC 1: COMPUTER HARDWARE

TOPIC 1: COMPUTER HARDWARE

University

40 Qs

ITE 292 P3 Exam

ITE 292 P3 Exam

University

37 Qs

hihi

hihi

University

39 Qs

System Administrator Activities Quiz

System Administrator Activities Quiz

University

40 Qs

ET Unit 1 (TVL)

ET Unit 1 (TVL)

11th Grade - University

40 Qs

REMIDI ASAT INFORMATIKA X

REMIDI ASAT INFORMATIKA X

10th Grade - University

40 Qs

CYB125 - Ch6

CYB125 - Ch6

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Damon Vogel

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?

Answers the question "who is asking to access the asset?"

Verifies that requestors are who they claim to be

Grants or denies a requestor access and what they can do on a network

Determines how actions can be traced to an individual

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?

Remote Authentication Dial-In User Service (RADIUS)

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a logical access control?

Key for a lock

Password

Access card

Fence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of authentication includes smart cards?

Knowledge

Ownership

Location

Action

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of two-factor authentication (2FA)?

Smart card and personal identification number (PIN)

PIN and password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?

Dictionary attack

Rainbow table attack

Social engineering attack

Brute-force attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?

Enables a 30-day password change policy

Requires all passwords to contain at least eight alphanumeric characters

Mandates that no password includes words common in an English dictionary

Forbids a password being changed to any of the previous 10 passwords listed in the password history

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)