
TestOut PC Pro - 14.4 Logical Security Measures
Authored by Rossana Mero
Computers
8th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following does Windows use to manage and enforce what a user is authorized to access?
Access control list
Soft token
Multi-factor authentication
Certificate Manager
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following BEST describes authorization?
The resources that a user can access.
The process of giving users access to only the resources they need.
The process of verifying a user's identity.
The policy of allowing employees to use their own devices for work purposes.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following processes is used to prove a user's identity?
Authorization
Logical security
Certificate Manager
Authentication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements is true regarding hard tokens?
Hard tokens are easy to replace if they are lost or stolen.
Hard tokens are inexpensive to implement.
Hard tokens provide a higher level of security.
Hard tokens provide protection even if they are lost or stolen.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have been hired to assess a client's security. During your testing, you discover that users have access to other departments' files. Which of the following should you recommend that the company implement?
Mobile device management
Certificate Manager
Principle of least privilege
Bring Your Own Device
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company has recently implemented a BYOD policy. To protect the network, users must install an app on their devices that allows the security administrator to enforce the security policies.
Soft token
Mobile device management
Access control list
Certificate Manager
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following authentication combinations is an example of multi-factor authentication?
Smart card and one-time code
PIN and authentication app
Fingerprint and retinal scan
Username and password
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
13 questions
Spreadsheets
Quiz
•
6th - 8th Grade
10 questions
Experiencing Chatbots in Real Life
Quiz
•
8th Grade
10 questions
¿Cuánto sabes sobre NFTs?
Quiz
•
KG - Professional Dev...
10 questions
Cyber Security
Quiz
•
1st - 10th Grade
10 questions
Grade6 E commerce
Quiz
•
6th - 9th Grade
10 questions
Understanding the cloud
Quiz
•
7th - 8th Grade
11 questions
Purpose of CPU
Quiz
•
8th - 10th Grade
10 questions
Jaringan LAN
Quiz
•
1st - 10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade