
Sec + CH.2 Pre-Assessment
Authored by Prem Jadhwani
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are comparing different types of authentication. Of the following
choices, which one uses multifactor authentication?
A system that requires users to enter a username and password
A system that checks an employee’s fingerprint and does a vein
scan
A cipher door lock that requires employees to enter a code to open
the door
A system that requires users to have a smart card and a PIN
Answer explanation
D is correct. A system that requires users to have a smart card and a
personal identification number (PIN) uses multifactor authentication or
two-factor authentication. The card is in the something you have factor, and
the PIN is in the something you know factor. A username provides
identification, and a password is in the something you know factor,
providing single-factor authentication. Fingerprints and vein scans are both
in the something you are factor, providing single-factor authentication. A
code for a cipher door lock is in the something you know factor, providing
single-factor authentication. See Chapter 2.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The chief information officer (CIO) at your organization suspects
someone is entering the data center after normal working hours and stealing
sensitive data. Which of the following actions can prevent this?
Upgrade the CCTV system.
Require smart cards to enter the data center.
Implement time-based logins.
Enable advanced auditing.
Answer explanation
C is correct. Time-based logins (sometimes called time-of-day
restrictions) would prevent this. They would prevent anyone from logging
in after normal working hours and accessing sensitive data. All of the other
answers can detect suspicious behavior, but they wouldn’t prevent the users
from logging in after normal working hours and stealing the data. See
Chapter 2.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A SQL database server was recently attacked. Cybersecurity
investigators discovered the attack was self-propagating through the
network. When it found the database server, it used well-known credentials
to access the database. Which of the following would be the BEST action to
prevent this from occurring again?
Change the default application password.
This describes a worm.
Implement 2FA.
Conduct a code review.
Answer explanation
A is correct. The default application password for the SQL server
should be changed. Some SQL Server software implementations can have a
default blank password for the SA account (the System Administrator
account), and these default credentials are well-known. While the scenario
describes a worm because it is self-propagating, the question is asking for
the best preventive action to take. Using two-factor authentication (2FA) is
a good practice for users, but it isn’t always feasible for application
passwords. A code review can detect flaws and vulnerabilities in internally
developed applications, but SQL Server is Microsoft software. See Chapter
2.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
You are reviewing security controls and their usefulness. You notice that
account lockout policies are in place. Which of the following attacks will
these policies thwart? (Select TWO.)
Brute force
DNS poisoning
Dictionary
Replay
Buffer overflow
Answer explanation
A and C are correct. Brute force and dictionary attacks attempt to guess
passwords, but an account lockout control locks an account after the wrong
password is guessed too many times. The other attacks are not password
attacks, so they aren’t mitigated using account lockout controls. Domain
Name System (DNS) poisoning attempts to redirect web browsers to
malicious URLs. Replay attacks attempt to capture packets to impersonate
one of the parties in an online session. Buffer overflow attacks attempt to
overwhelm online applications with unexpected code or data. See Chapters
2 and 10.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
IT administrators created a VPN for employees to use while working
from home. The VPN is configured to provide AAA services. Which of the
following would be presented to the AAA system for identification?
Password
Permissions
Username identification
Tunneling certificate
Hardware token
Answer explanation
C is correct. Users would typically enter a username as identification
for an authentication, authorization, and accounting (AAA) system. Users
would provide a password as proof that the claimed identity (the username)
is theirs. The password provides authentication. Users are assigned
permissions based on their proven identity, but the permissions do not
provide authentication. The virtual private network (VPN) would encrypt
traffic sent via the VPN tunnel, and this traffic may be encrypted with the
use of a certificate. However, this is not called a tunneling certificate, and
the certificate used for encryption does not provide identification. A
hardware token is often used as an additional method of authentication, but
it does not provide identification. See Chapter 2.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After a recent attack, security investigators discovered that attackers
logged on with an administrator account. They recommend implementing a
solution that will thwart this type of attack in the future. The solution must
support the following requirements:
Allow authorized users to access the administrator account
without knowing the password.
Allow authorized users to check out the credentials when
needed.
Log each time the credentials are used.
Automatically change the password.
Which of the following answers would meet these requirements?
Privileged access management
OpenID Connect
MAC scheme
MFA
Answer explanation
A is correct. A privileged access management system protects and limits
access to privileged accounts such as administrator accounts. OpenID
Connect is used for authentication and authorization on the Internet, not
internal networks. A mandatory access control (MAC) scheme uses labels
to control access, but it isn’t used to control access to administrator
accounts. Multifactor authentication (MFA) uses more than one factor of
authentication, but it doesn’t meet any of the requirements of this scenario.
See Chapter 2.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lisa wants to implement a secure authentication system on a website.
However, instead of collecting and storing user passwords, she wants to use
a third-party system. Which of the following is the BEST choice to meet
this goal?
SAML
Kerberos
SSH
OAuth
Answer explanation
A is correct. Security Assertion Markup Language (SAML) is a single
sign-on SSO solution that can use third-party websites, and it provides
authentication. Kerberos is an SSO solution used on internal networks such
as in Microsoft Active Directory domains. Secure Shell (SSH) is used for
remote administration. OAuth (think of this as Open Authorization) is used
for authorization, but the scenario wants a solution for authentication. See
Chapter 2.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Bedrock Immersion Day Quiz
Quiz
•
Professional Development
11 questions
Types of Mass Media
Quiz
•
10th Grade - Professi...
10 questions
Pengenalan Digital Marketing
Quiz
•
KG - Professional Dev...
10 questions
Friday Fun
Quiz
•
Professional Development
12 questions
Guess the Gaming Pet 1
Quiz
•
KG - Professional Dev...
11 questions
Technology Morning Tea Quiz
Quiz
•
KG - Professional Dev...
10 questions
SQL Commands - SELECT Statements
Quiz
•
Professional Development
10 questions
Day 3 C Programming quiz
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...