
Quiz 02-Finals-IT 222-FIAS
Authored by Enrico Lucero
Information Technology (IT)
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which component primarily ensures that only authenticated users can access sensitive information by verifying their physical or behavioral traits?
Which component primarily ensures that only authenticated users can access sensitive information by verifying their physical or behavioral traits?
Certificates
Biometrics
Tokens
Passwords
2.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
In a security system, which method utilizes a trusted third-party authority to establish a user's identity via a digitally issued credential?
In a security system, which method utilizes a trusted third-party authority to establish a user's identity via a digitally issued credential?
Multi-factor authentication
Digital certificates
Biometric authentication
Secure socket layer (SSL)
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A company mandates the use of both something the user knows and something the user has to access its system. This is an example of:
A company mandates the use of both something the user knows and something the user has to access its system. This is an example of:
Single-factor authentication
Multi-factor authentication
Biometric authentication
Token-based authentication only
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which security feature is most susceptible to being compromised if an attacker steals stored data without proper encryption?
Which security feature is most susceptible to being compromised if an attacker steals stored data without proper encryption?
Biometrics
Digital certificates
Passwords
Certificates issued by trusted authorities
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
When an organization utilizes a hardware device generating one-time passwords that are used for authentication, this is best classified as:
When an organization utilizes a hardware device generating one-time passwords that are used for authentication, this is best classified as:
Biometric verification
Certificate-based authentication
Token-based authentication
Password authentication
6.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
A small startup is considering implementing an authentication system that balances ease of use with security. They want something robust but user-friendly, primarily for internal access. Which method should they prioritize?
A small startup is considering implementing an authentication system that balances ease of use with security. They want something robust but user-friendly, primarily for internal access. Which method should they prioritize?
Multi-factor authentication combining biometrics and hardware tokens
Passwords combined with digital certificates
Biometric authentication alone
Single-factor password-based authentication
7.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
An organization is designing a web application that must protect user credentials both in transit and at rest. Which combination of security measures best addresses this need?
An organization is designing a web application that must protect user credentials both in transit and at rest. Which combination of security measures best addresses this need?
SSL/TLS for data in transit and encrypted storage for credentials
Biometric security on the client-side and unencrypted server storage
Certificates issued by third-party authorities and plain-text passwords
Hardware tokens and storage without encryptio
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?