CyberSec-TestD

CyberSec-TestD

Professional Development

30 Qs

quiz-placeholder

Similar activities

CompTIA Security+ Certification Exam SY0-701 Practice Test 1

CompTIA Security+ Certification Exam SY0-701 Practice Test 1

Professional Development

25 Qs

A+ 1102 Day 4a ITSA 2.1 Summarize security measures

A+ 1102 Day 4a ITSA 2.1 Summarize security measures

Professional Development

35 Qs

A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

Professional Development

29 Qs

Fortress IQ: The ISMS Quest

Fortress IQ: The ISMS Quest

Professional Development

25 Qs

A+ - 14C - Configure Windows Security Settings

A+ - 14C - Configure Windows Security Settings

Professional Development

25 Qs

Security+ Identity and Account Types

Security+ Identity and Account Types

Professional Development

30 Qs

Security+ Authentication Technologies

Security+ Authentication Technologies

Professional Development

30 Qs

Sec+ Day 2 Cryptographic Solutions and Identity Management Quiz

Sec+ Day 2 Cryptographic Solutions and Identity Management Quiz

Professional Development

30 Qs

CyberSec-TestD

CyberSec-TestD

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Victor A

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ruth, a security professional, wanted to confirm the identity of newly joined employees. She sent email links of the company's portal to all the newly joined employees. The employees need to enter initial access token to login on to the portal, then they will receive an OTP on their mobile phone to upload their scanned certificate copies. Which of the following types of authentication has Ruth implemented in this scenario?

Password authentication

Two-factor authentication

Biometric authentication

Single sign-on (SSO) authentication

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Obi, a security specialist at an organization, was tasked with implementing an authentication mechanism for their employees. He employed an authentication mechanism that scans the facial features of employees and compares them with the patterns stored in the database. ........ authentication method was implemented by Obi here. (One word only)

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following types of accounts are the default accounts of operating systems and run with the least privileges, with permissions such as running applications and creating and manipulating files that belong to their profile? (Two Correct Answers)

User accounts

Guest accounts

Root accounts

Privileged accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fumilayo, a security professional, was instructed to limit employees’ access to critical resources. For this purpose, she implemented an access principle that provides permission to access only necessary resources that are required for their job tasks. The permissions can be extended later based on changes in their job roles. Identify the access principle implemented by Fumilayo in this situation.

Separation of duties

Need-to-know

Principle of least privilege

Rule-based access control

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Bello, an employee at a software company, needs to log in every day before starting his work. The company has a separate HR portal for maintaining employee attendance details. Every day, Bello accesses the portal, provides his credentials, and logs in before starting his work. The ............... authentication method is demonstrated in the above scenario. (One word only)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the access control principle that ensures that no single individual has the authorization rights to perform all functions and simultaneously denies access of all the objects to a single individual.

Principle of highest privilege (PoHP)

Separation of Duties (SoD)

Need-to-know principle

Discretionary Access control (DAC)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Okon, a network administrator, was assigned a task to create a standard access control model for the organization's confidential data. He implemented an access control model that determines the usage and access policies for the users. After its implementation, only users with appropriate access rights can access the resource. Which of the following access control models has Okon implemented in the cited scenario above?

Mandatory access control (MAC)

Discretionary access control (DAC)

Role-based access control (RBAC)

Rule-based access control (RB-RBAC)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?