
Domain 6 Security

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Amy Merchant
Used 6+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do biometrics use to perform authentication of identity?
Biological attributes
Knowledge of passwords
Possession of a device
Ability to perform tasks
Answer explanation
Biometrics is based on biological attributes. Biometrics is a strong form of authentication because each person has unique characteristics. When these unique characteristics are used for authentication, they are more reliable and stronger than the best passwords. For example, no two people have the exact same fingerprint or retina pattern.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which software is Microsoft's anti-malware product that is preinstalled on most new computers?
ESET NOD32
Norton Antivirus
Windows Defender
McAfee VirusScan
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company wants to use multifactor authentication. Which of the following would you most likely suggest?
Fingerprint and retinal scan
Password and passphrase
Token and smartphone
PIN and smart card
Answer explanation
Systems and accounts that need extra security often require multifactor authentication, generally from two or more types. This simply means you have to authenticate yourself two or more times to gain access to a system. Since a PIN is type 1 authentication and a smart card is type 2 authentication, these two would be considered multifactor authentication.
Since passwords and passphrases are both type 1, they would not amount to multifactor authentication.
Since security tokens and smartphones are both type 2, they would not amount to multifactor authentication.
Since fingerprints and retinal scans are both type 3, they would not amount to multifactor authentication.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A systems engineer is part of a company team creating a business continuity plan to recover critical data in case of a natural disaster.
Which of the following fault tolerance methods should the team include in the plan to be able to recover data? (Select two.)
Replication
Data Center
Power redundancy
Redundant Array of Independent Disks (RAID)
Site redundancy
Answer explanation
Site redundancy provides a complete duplicate of another location's computers and data. This is useful in the case of a major catastrophe, such as an earthquake or tornado, away from your main business location.
Replication is a data redundancy strategy where data is copied to a different physical location. This strategy works well in the case of a major catastrophe, such as an earthquake or tornado.
Power redundancy protects against service or data loss due to a power outage. However, if servers are destroyed during a natural disaster, power redundancy does not help to recover critical data.
Redundant Array of Independent Disks (RAID) is designed to store a duplicate of the same data on two or more disks simultaneously. If one disk fails, the data can still be accessed by using one of the other disks. However, this fault tolerance strategy does not address a natural disaster in which the entire RAID array is destroyed.
A data center is an area used to store and share such things as computer systems, applications, and data. However, during a natural disaster, a data center can be completely or partially destroyed.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which of the following situations should you expect total privacy?
Instant messaging
Email messages and attachments
Social networking
Financial transactions
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following authentication types include security questions as a factor for providing security?
Type 1 authentication
Type 2 authentication
Type 3 authentication
Single sign-on authentication
Answer explanation
Type 1 authentication (something you know) is by far the most common authentication type and includes security questions.
Type 2 authentication (something you have) does not include security questions.
Type 3 authentication (something you are) does not include security questions.
Single sign-on authentication is a method for logging into one system to gain access to other related systems. It is not a type of authentication and does not focus on security questions.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?
Multifactor authentication
VPN
Mandatory Access Control (MAC)
Single sign-on
Answer explanation
A VPN establishes a secure communications tunnel over a public network to a secure network. Using a VPN would provide secure transmission of the data.
The following do not secure the transmission of data over a public network:
Single sign-on is a method of authenticating with one system to gain access to other related systems.
Multifactor authentication requires two or more evidences of authentication, usually of different types.
Mandatory Access Control (MAC) is a type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources.
8.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
As a system administrator, you are modifying access control lists to make sure that company employees are only given access to company resources that they need to do specific tasks.
Which of the following BEST describes this process of limiting access rights?
Accounting
Principle of least privilege
Type 3 authentication
Non-repudiation
Answer explanation
When you create or modify access control lists (ACLs) and policies, it's best to practice the principle of least privilege. This principle states that users only be given the access that they need to do their specific tasks and nothing more.
Type 3 authentication requires that you use something you are in order to authenticate (such as a fingerprint). It is not a process of granting access rights to company resources.
Accounting is the process of keeping track of user activity while attached to a system. It is not a process of granting access rights to company resources.
Non-repudiation is a method for making sure that a user cannot deny having performed a certain action. It does not focus on granting access rights to company resources.
Similar Resources on Wayground
9 questions
1.1.3 Email and Social Media Security Risk Quiz

Quiz
•
12th Grade
10 questions
ICT Quiz 1 - Quarter 4

Quiz
•
9th - 12th Grade
10 questions
Cybersecurity and Malware Quiz

Quiz
•
10th Grade
9 questions
Networking - Quiz 5 - Biometric Authentication

Quiz
•
9th Grade
10 questions
Enterprise Computing_Quiz2Series

Quiz
•
12th Grade - University
10 questions
Introduction to MS Access 2013

Quiz
•
7th Grade - University
10 questions
Grade 12 Operating Systems Quiz

Quiz
•
12th Grade
10 questions
Biometrics-IGCSE ICT

Quiz
•
9th - 11th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
Proper Keyboarding Techniques

Interactive video
•
6th - 10th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
10 questions
Understanding Computers: Hardware, Software, and Operating Systems

Interactive video
•
7th - 12th Grade
29 questions
AP CSP Unit 2 Review (Code.org)

Quiz
•
10th - 12th Grade