TestOut PC Pro - 14.4 Logical Security Measures

TestOut PC Pro - 14.4 Logical Security Measures

8th Grade

10 Qs

quiz-placeholder

Similar activities

Information Security Quiz

Information Security Quiz

8th Grade

15 Qs

Year 9 L6 SECURITY part 1

Year 9 L6 SECURITY part 1

8th Grade

11 Qs

Fundamentals of Cybersecurity Check Understanding Activity

Fundamentals of Cybersecurity Check Understanding Activity

6th - 8th Grade

10 Qs

Year 9 - Cybersecurity

Year 9 - Cybersecurity

6th - 8th Grade

15 Qs

8RS 8.3.6 PLENARY

8RS 8.3.6 PLENARY

8th Grade

12 Qs

Class 8_Computer

Class 8_Computer

8th Grade

10 Qs

Quiz sobre BancoChat

Quiz sobre BancoChat

1st Grade - University

10 Qs

A+ 1002 Chapter 4 Review

A+ 1002 Chapter 4 Review

7th - 12th Grade

15 Qs

TestOut PC Pro - 14.4 Logical Security Measures

TestOut PC Pro - 14.4 Logical Security Measures

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Rossana Mero

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following does Windows use to manage and enforce what a user is authorized to access?

Access control list

Soft token

Multi-factor authentication

Certificate Manager

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST describes authorization?

The resources that a user can access.

The process of giving users access to only the resources they need.

The process of verifying a user's identity.

The policy of allowing employees to use their own devices for work purposes.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following processes is used to prove a user's identity?

Authorization

Logical security

Certificate Manager

Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true regarding hard tokens?

Hard tokens are easy to replace if they are lost or stolen.

Hard tokens are inexpensive to implement.

Hard tokens provide a higher level of security.

Hard tokens provide protection even if they are lost or stolen.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been hired to assess a client's security. During your testing, you discover that users have access to other departments' files. Which of the following should you recommend that the company implement?

Mobile device management

Certificate Manager

Principle of least privilege

Bring Your Own Device

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has recently implemented a BYOD policy. To protect the network, users must install an app on their devices that allows the security administrator to enforce the security policies.

Soft token

Mobile device management

Access control list

Certificate Manager

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following authentication combinations is an example of multi-factor authentication?

Smart card and one-time code

PIN and authentication app

Fingerprint and retinal scan

Username and password

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?