AEIC 326 3 Quiz

AEIC 326 3 Quiz

University

45 Qs

quiz-placeholder

Similar activities

Cryptology Tools

Cryptology Tools

University

45 Qs

ISAC Team Quiz

ISAC Team Quiz

KG - Professional Development

40 Qs

AHJ: U6 Data Privacy and Security

AHJ: U6 Data Privacy and Security

12th Grade - University

50 Qs

2.3 Robust Programs

2.3 Robust Programs

9th Grade - University

40 Qs

Midterm: Information Assurance and Security

Midterm: Information Assurance and Security

University

40 Qs

Understanding Security and Maintenance

Understanding Security and Maintenance

8th Grade - University

40 Qs

CompTIA ITFundamentals CRAM

CompTIA ITFundamentals CRAM

6th Grade - University

46 Qs

Security+ Cryptography Quiz

Security+ Cryptography Quiz

University

45 Qs

AEIC 326 3 Quiz

AEIC 326 3 Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Jeffrey Garrido

Used 2+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It’s the act of confirming the truth of an attribute of a datum or entity.

Encryption

Authentication

Decryption

Both A and C

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is authentication primarily concerned with?

Encrypting data


Confirming the truth of an attribute


Granting access to resources


Logging user activities


3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following best describes authentication?


The act of authorizing a user


The process of encrypting data


The verification of a claimed identity


The act of logging user activities


4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Authentication is typically based on which three main factors?


What you know, what you have, who you are


What you say, what you do, where you are


 What you type, what you click, how you behave


What you remember, what you forget, how you think


5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is NOT mentioned as a primary aspect of authorization in the text?

Bio-metric data

A physical token

A password or PIN

A behavioral pattern

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The "what you have" factor in authentication often involves:


A secret question


A physical device or token


 A fingerprint


 A written signature


7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which authentication factor is most closely associated with biometrics?


What you know


What you have

Who you are


Where you are


Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?