Ruth, a security professional, wanted to confirm the identity of newly joined employees. She sent email links of the company's portal to all the newly joined employees. The employees need to enter initial access token to login on to the portal, then they will receive an OTP on their mobile phone to upload their scanned certificate copies. Which of the following types of authentication has Ruth implemented in this scenario?

CyberSec-TestD

Quiz
•
Computers
•
Professional Development
•
Medium
Victor A
Used 3+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Password authentication
Two-factor authentication
Biometric authentication
Single sign-on (SSO) authentication
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Obi, a security specialist at an organization, was tasked with implementing an authentication mechanism for their employees. He employed an authentication mechanism that scans the facial features of employees and compares them with the patterns stored in the database. ........ authentication method was implemented by Obi here. (One word only)
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following types of accounts are the default accounts of operating systems and run with the least privileges, with permissions such as running applications and creating and manipulating files that belong to their profile? (Two Correct Answers)
User accounts
Guest accounts
Root accounts
Privileged accounts
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Fumilayo, a security professional, was instructed to limit employees’ access to critical resources. For this purpose, she implemented an access principle that provides permission to access only necessary resources that are required for their job tasks. The permissions can be extended later based on changes in their job roles. Identify the access principle implemented by Fumilayo in this situation.
Separation of duties
Need-to-know
Principle of least privilege
Rule-based access control
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Bello, an employee at a software company, needs to log in every day before starting his work. The company has a separate HR portal for maintaining employee attendance details. Every day, Bello accesses the portal, provides his credentials, and logs in before starting his work. The ............... authentication method is demonstrated in the above scenario. (One word only)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the access control principle that ensures that no single individual has the authorization rights to perform all functions and simultaneously denies access of all the objects to a single individual.
Principle of highest privilege (PoHP)
Separation of Duties (SoD)
Need-to-know principle
Discretionary Access control (DAC)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Okon, a network administrator, was assigned a task to create a standard access control model for the organization's confidential data. He implemented an access control model that determines the usage and access policies for the users. After its implementation, only users with appropriate access rights can access the resource. Which of the following access control models has Okon implemented in the cited scenario above?
Mandatory access control (MAC)
Discretionary access control (DAC)
Role-based access control (RBAC)
Rule-based access control (RB-RBAC)
Create a free account and access millions of resources
Similar Resources on Quizizz
33 questions
1002 A + Ch 04 & 05 Security Principles & Security Technologies

Quiz
•
Professional Development
30 questions
A+ Core2 Day5a manage and configure basic security Windows

Quiz
•
Professional Development
26 questions
Planning a Network Infrastructure

Quiz
•
KG - Professional Dev...
25 questions
Quiz 1 Selling HPE AI & As-a-Service Solution - M2 Market Trends

Quiz
•
Professional Development
30 questions
Sec+ Day 2 Cryptographic Solutions and Identity Management Quiz

Quiz
•
Professional Development
35 questions
A+ 1102 Day 4a ITSA 2.1 Summarize security measures

Quiz
•
Professional Development
30 questions
Comptia Security+ Understanding Application Attacks and security

Quiz
•
Professional Development
26 questions
Sec+ - 10A - Implement Endpoint Security

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade