Chapter	9.	Physical	Security	and	Authentication Models

Chapter 9. Physical Security and Authentication Models

University

35 Qs

quiz-placeholder

Similar activities

Bridge Course - Screening Test

Bridge Course - Screening Test

10th Grade - Professional Development

30 Qs

Blank Quiz

Blank Quiz

University

30 Qs

Class Test 1 - CSE 443 (Mobile Telecommunication)

Class Test 1 - CSE 443 (Mobile Telecommunication)

University

40 Qs

MTA Windows OS Fundamentals Test 1

MTA Windows OS Fundamentals Test 1

9th Grade - Professional Development

35 Qs

Quiz 2 - Fall 2023

Quiz 2 - Fall 2023

University

35 Qs

Freehand and Digital Drawing Midterm Exam 2021-2022

Freehand and Digital Drawing Midterm Exam 2021-2022

University

30 Qs

MOS Word 2016 - Quiz 2

MOS Word 2016 - Quiz 2

University

34 Qs

Examen AIP Simulacro

Examen AIP Simulacro

University

30 Qs

Chapter	9.	Physical	Security	and	Authentication Models

Chapter 9. Physical Security and Authentication Models

Assessment

Quiz

Computers, Other Sciences

University

Practice Problem

Hard

Used 56+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the verification of a person’s identity?

Authorization
Accountability
Authentication
Password

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would fall into the category of “something a person Is”?

Passwords
Passphrases
Fingerprints
Smart cards

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following are good practices for tracking user identities? (Select the two best answers.)

Video cameras, Key card door access systems
Key card door access systems, Sign-in sheets
Sign-in sheets, Security guards
Security guards, Video cameras

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are two examples of common single sign-on authentication configurations? (Select the two best answers.)

Biometrics-based, Smart card-based
Multifactor authentication, Biometrics-based
Kerberos-based, Multifactor authentication
Smart card-based, Kerberos-based

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of two-factor authentication?

L2TP and Ipsec
Username and password
Thumprint and key card
Client and server

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main purpose of a physical access log?

To enable authorized employee access
To show who exited the facility
To show who entered the facility
To prevent unauthorized employee access

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a common criteria when authenticating users?

Something you do
Something you are
Something you know
Something you like

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?