Security Plus 1-02

Quiz
•
Instructional Technology
•
Professional Development
•
Medium

Prem Jadhwani
Used 52+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these Authentication Concepts PROVE a users identity?
Identification
Authentication
Authorization
Access
Answer explanation
Identification professes an identity.
Authentication proves an identity.
Authorization grants access to resources based on authentication.
Access just means you have access.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A user name and password fall into which of these factors of authentication?
Something you are
Something you have
Something you know
Something you do
Answer explanation
These fall into something you know.
Something you do is a gesture on a touch screen.
Something you have is like a smart card.
Something you are is like your fingerprint.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which IT term is used for logging all activities to ensure there is clear evidence.
Note Taking
Log Keeping
Record Management
Accounting
Answer explanation
In Identity and Access Management, Accounting is the term used for logging all activities to ensure there is clear evidence.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A unit used to measure the average number of unauthorized users who are incorrectly verified as authorized users on a biometric security system.
False Acceptance Rate
False Rejection Rate
True Acceptance Rate
True Rejection Rate
Answer explanation
FAR - False Acceptance Rate is a way to measure how many people get into a place that aren't supposed to be allowed in. It identifies when a biometric security system allows an unauthorized user in due to an error, falsely saying they are authorized to go in.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which is an example of multi-factor authentication (MFA)?
Fingerprint and Smart Card
Username and Password
Retinal Scan and Fingerprint
Key Fob and time-based one-time password (TOTP)
Answer explanation
Fingerprint and Smart Card is something you are and something you have.
Every other option is the same category.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A time-stamped ticket-based system used for network authentication that runs over port 88.
TACACS+
Kubernetes
Kerberos
WPA2-Enterprise
Answer explanation
Kerberos is a network authentication protocol that runs over port 88 and uses a ticket granting service where the tickets will expire after a period of time. We authenticate with port 88.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What port does RADIUS (Remote Authentication Dial-In User Service) use?
389
1812
1701
22
Answer explanation
RADIUS uses port 1812.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Importance of Logs

Quiz
•
Professional Development
20 questions
Core 1 Test Review

Quiz
•
Professional Development
20 questions
BCS Network Security Test 7

Quiz
•
University - Professi...
20 questions
AWS Quiz Show 2023 (Week 1)

Quiz
•
Professional Development
15 questions
BCS Systems & Architecture Raymond's Quiz

Quiz
•
University - Professi...
15 questions
2024 ICT Training Day1

Quiz
•
Professional Development
15 questions
DDIN and LBAS quiz

Quiz
•
Professional Development
20 questions
Azure Fundamentals - Clase 2

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade