Untitled Quiz

Untitled Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

PC Security

PC Security

Professional Development

10 Qs

Security+ Study Guide-02 Understanding Identity & Access Mgnt

Security+ Study Guide-02 Understanding Identity & Access Mgnt

Professional Development

15 Qs

Password Safety & Security

Password Safety & Security

KG - Professional Development

11 Qs

Security + Day 6 Review

Security + Day 6 Review

Professional Development

11 Qs

Intro to Cybersecurity 3

Intro to Cybersecurity 3

12th Grade - Professional Development

12 Qs

Digital Footprint Seminar Assessment

Digital Footprint Seminar Assessment

Professional Development

15 Qs

ISC2 - Chapter 1 - Module 1 - G2

ISC2 - Chapter 1 - Module 1 - G2

Professional Development

15 Qs

Windows Server Active Directory

Windows Server Active Directory

University - Professional Development

12 Qs

Untitled Quiz

Untitled Quiz

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Victor A

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Adam, a security specialist at an organization, was tasked with implementing an authentication mechanism for their employees. He employed an authentication mechanism that scans the facial features of employees and compares them with the patterns stored in the database. Identify the authentication method implemented by Adam in the above scenario.

Two-factor authentication

Biometric authentication

Single sign-on authentication

Password authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of accounts are the default accounts of operating systems and run with the least privileges, with permissions such as running applications and creating and manipulating files that belong to their profile?

Privileged accounts

Root accounts

Guest accounts

User accounts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rebecca, a security professional, was instructed to limit employees’ access to critical resources. For this purpose, she implemented an access principle that provides permission to access only necessary resources that are required for their job tasks. The permissions can be extended later based on changes in their job roles. Identify the access principle implemented by Rebecca in the above scenario.

Rule-based access control

Principle of least privilege (POLP)

Need-to-know

Separation of duties (SoD)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ryder, an employee at a software company, needs to log in every day before starting his work. The company has a separate HR portal for maintaining employee attendance details. Every day, Ryder accesses the portal, provides his credentials, and logs in before starting his work. Identify the authentication method demonstrated in the above scenario.

Password authentication

Smart card authentication

Biometric authentication

Two-factor authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Vincent, a security professional, was hired by an organization to update and make configuration changes to their existing systems. For this purpose, he was provided with a type of account that contains elevated privileges to perform administrative activities such as installing and uninstalling applications or system software. Which of the following types of account was provided to Vincent in the above scenario?

Root account

Default account

Guest account

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has just opened a call center in India to handle

nighttime operations, and you are asked to review the site’s

security controls. Specifically, you are asked which of the following

is the strongest form of authentication. What will your answer be?

Something you know

Something you are

Passwords

Tokens

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the three primary types of

authentication?

Something you remember

Something you know

Something you are

Something you have

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?