Search Header Logo

Untitled Quiz

Authored by Victor A

Computers

Professional Development

Used 1+ times

Untitled Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Adam, a security specialist at an organization, was tasked with implementing an authentication mechanism for their employees. He employed an authentication mechanism that scans the facial features of employees and compares them with the patterns stored in the database. Identify the authentication method implemented by Adam in the above scenario.

Two-factor authentication

Biometric authentication

Single sign-on authentication

Password authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of accounts are the default accounts of operating systems and run with the least privileges, with permissions such as running applications and creating and manipulating files that belong to their profile?

Privileged accounts

Root accounts

Guest accounts

User accounts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rebecca, a security professional, was instructed to limit employees’ access to critical resources. For this purpose, she implemented an access principle that provides permission to access only necessary resources that are required for their job tasks. The permissions can be extended later based on changes in their job roles. Identify the access principle implemented by Rebecca in the above scenario.

Rule-based access control

Principle of least privilege (POLP)

Need-to-know

Separation of duties (SoD)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ryder, an employee at a software company, needs to log in every day before starting his work. The company has a separate HR portal for maintaining employee attendance details. Every day, Ryder accesses the portal, provides his credentials, and logs in before starting his work. Identify the authentication method demonstrated in the above scenario.

Password authentication

Smart card authentication

Biometric authentication

Two-factor authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Vincent, a security professional, was hired by an organization to update and make configuration changes to their existing systems. For this purpose, he was provided with a type of account that contains elevated privileges to perform administrative activities such as installing and uninstalling applications or system software. Which of the following types of account was provided to Vincent in the above scenario?

Root account

Default account

Guest account

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has just opened a call center in India to handle

nighttime operations, and you are asked to review the site’s

security controls. Specifically, you are asked which of the following

is the strongest form of authentication. What will your answer be?

Something you know

Something you are

Passwords

Tokens

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the three primary types of

authentication?

Something you remember

Something you know

Something you are

Something you have

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?