Search Header Logo

TestOut PC Pro - 14.4 Logical Security Measures

Authored by Rossana Mero

Computers

8th Grade

TestOut PC Pro - 14.4 Logical Security Measures
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following does Windows use to manage and enforce what a user is authorized to access?

Access control list

Soft token

Multi-factor authentication

Certificate Manager

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following BEST describes authorization?

The resources that a user can access.

The process of giving users access to only the resources they need.

The process of verifying a user's identity.

The policy of allowing employees to use their own devices for work purposes.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following processes is used to prove a user's identity?

Authorization

Logical security

Certificate Manager

Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true regarding hard tokens?

Hard tokens are easy to replace if they are lost or stolen.

Hard tokens are inexpensive to implement.

Hard tokens provide a higher level of security.

Hard tokens provide protection even if they are lost or stolen.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been hired to assess a client's security. During your testing, you discover that users have access to other departments' files. Which of the following should you recommend that the company implement?

Mobile device management

Certificate Manager

Principle of least privilege

Bring Your Own Device

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has recently implemented a BYOD policy. To protect the network, users must install an app on their devices that allows the security administrator to enforce the security policies.

Soft token

Mobile device management

Access control list

Certificate Manager

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following authentication combinations is an example of multi-factor authentication?

Smart card and one-time code

PIN and authentication app

Fingerprint and retinal scan

Username and password

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?