Quiz 02-Finals-IT 222-FIAS

Quiz 02-Finals-IT 222-FIAS

University

18 Qs

quiz-placeholder

Similar activities

Quiz sul modello Zero Trust e Cyber Risk

Quiz sul modello Zero Trust e Cyber Risk

10th Grade - University

20 Qs

Advanced Drone Regulations Quiz

Advanced Drone Regulations Quiz

5th Grade - University

20 Qs

Cuestionario sobre Ataques de Red

Cuestionario sobre Ataques de Red

University

20 Qs

BAB 4 SISTEM KOMPUTER KELAS 8

BAB 4 SISTEM KOMPUTER KELAS 8

8th Grade - University

20 Qs

C3Quiz

C3Quiz

University

15 Qs

Online Privacy Awareness Quiz

Online Privacy Awareness Quiz

7th Grade - University

13 Qs

Chapter (3) Quiz (Sec+)

Chapter (3) Quiz (Sec+)

University

15 Qs

Test

Test

University

15 Qs

Quiz 02-Finals-IT 222-FIAS

Quiz 02-Finals-IT 222-FIAS

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Enrico Lucero

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

  1. Which component primarily ensures that only authenticated users can access sensitive information by verifying their physical or behavioral traits?

Certificates

Biometrics

Tokens

Passwords

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

  1. In a security system, which method utilizes a trusted third-party authority to establish a user's identity via a digitally issued credential?

Multi-factor authentication

Digital certificates

Biometric authentication

Secure socket layer (SSL)

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

  1. A company mandates the use of both something the user knows and something the user has to access its system. This is an example of:

Single-factor authentication

Multi-factor authentication

Biometric authentication

Token-based authentication only

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

  1. Which security feature is most susceptible to being compromised if an attacker steals stored data without proper encryption?

Biometrics

Digital certificates

Passwords

Certificates issued by trusted authorities

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

  1. When an organization utilizes a hardware device generating one-time passwords that are used for authentication, this is best classified as:

Biometric verification

Certificate-based authentication

Token-based authentication

Password authentication

6.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

  1. A small startup is considering implementing an authentication system that balances ease of use with security. They want something robust but user-friendly, primarily for internal access. Which method should they prioritize?

Multi-factor authentication combining biometrics and hardware tokens

Passwords combined with digital certificates

Biometric authentication alone

Single-factor password-based authentication

7.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

  1. An organization is designing a web application that must protect user credentials both in transit and at rest. Which combination of security measures best addresses this need?

SSL/TLS for data in transit and encrypted storage for credentials

Biometric security on the client-side and unencrypted server storage

Certificates issued by third-party authorities and plain-text passwords

Hardware tokens and storage without encryptio

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?