WEEK 5

WEEK 5

University

20 Qs

quiz-placeholder

Similar activities

Quiz2_Drone Hacking

Quiz2_Drone Hacking

University

25 Qs

Mobile Security Quiz

Mobile Security Quiz

University

25 Qs

DBMS FINAL EXAM TRUE OR FALSE 2024-25

DBMS FINAL EXAM TRUE OR FALSE 2024-25

University

20 Qs

Cloud Service Models & Software Process Models

Cloud Service Models & Software Process Models

2nd Grade - University

20 Qs

Usable Encryption Quiz

Usable Encryption Quiz

University

20 Qs

OSS (QUIZ 8) Security and Protection

OSS (QUIZ 8) Security and Protection

University

15 Qs

Revision

Revision

University

25 Qs

Cyber Offences Quiz

Cyber Offences Quiz

University

20 Qs

WEEK 5

WEEK 5

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Edward Adu

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is the primary purpose of authentication in security?

To encrypt data

To verify a user's identity

To monitor network traffic

To manage user permissions

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is an example of "Something You Have"?

Password

Fingerprint

Smart Card

Security Question

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Multi-Factor Authentication (MFA) requires:

At least one authentication factor

At least two authentication factors

Only a password

A biometric scan only

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Single Sign-On (SSO) allows users to:

Use multiple passwords for different applications

Authenticate once and access multiple applications

Bypass authentication entirely

Change passwords frequently

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is a risk associated with Single Sign-On (SSO)?

Increased password complexity

Multiple accounts are at risk if credentials are compromised

Reduced user convenience

Increased login times

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following is a benefit of Multi-Factor Authentication (MFA)?

It simplifies the login process

It reduces the need for passwords

It provides stronger security against password attacks

It eliminates the need for user training

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which access control model allows the resource owner to determine access?

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)

Discretionary Access Control (DAC)

Attribute-Based Access Control (ABAC)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)