Search Header Logo

CyberSec-TestD

Authored by Victor A

Computers

Professional Development

Used 3+ times

CyberSec-TestD
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ruth, a security professional, wanted to confirm the identity of newly joined employees. She sent email links of the company's portal to all the newly joined employees. The employees need to enter initial access token to login on to the portal, then they will receive an OTP on their mobile phone to upload their scanned certificate copies. Which of the following types of authentication has Ruth implemented in this scenario?

Password authentication

Two-factor authentication

Biometric authentication

Single sign-on (SSO) authentication

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Obi, a security specialist at an organization, was tasked with implementing an authentication mechanism for their employees. He employed an authentication mechanism that scans the facial features of employees and compares them with the patterns stored in the database. ........ authentication method was implemented by Obi here. (One word only)

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following types of accounts are the default accounts of operating systems and run with the least privileges, with permissions such as running applications and creating and manipulating files that belong to their profile? (Two Correct Answers)

User accounts

Guest accounts

Root accounts

Privileged accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fumilayo, a security professional, was instructed to limit employees’ access to critical resources. For this purpose, she implemented an access principle that provides permission to access only necessary resources that are required for their job tasks. The permissions can be extended later based on changes in their job roles. Identify the access principle implemented by Fumilayo in this situation.

Separation of duties

Need-to-know

Principle of least privilege

Rule-based access control

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Bello, an employee at a software company, needs to log in every day before starting his work. The company has a separate HR portal for maintaining employee attendance details. Every day, Bello accesses the portal, provides his credentials, and logs in before starting his work. The ............... authentication method is demonstrated in the above scenario. (One word only)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the access control principle that ensures that no single individual has the authorization rights to perform all functions and simultaneously denies access of all the objects to a single individual.

Principle of highest privilege (PoHP)

Separation of Duties (SoD)

Need-to-know principle

Discretionary Access control (DAC)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Okon, a network administrator, was assigned a task to create a standard access control model for the organization's confidential data. He implemented an access control model that determines the usage and access policies for the users. After its implementation, only users with appropriate access rights can access the resource. Which of the following access control models has Okon implemented in the cited scenario above?

Mandatory access control (MAC)

Discretionary access control (DAC)

Role-based access control (RBAC)

Rule-based access control (RB-RBAC)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?