Search Header Logo

Domain 6 Security

Authored by Amy Merchant

Computers

9th - 12th Grade

Used 6+ times

Domain 6 Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do biometrics use to perform authentication of identity?

Biological attributes

Knowledge of passwords

Possession of a device

Ability to perform tasks

Answer explanation

Biometrics is based on biological attributes. Biometrics is a strong form of authentication because each person has unique characteristics. When these unique characteristics are used for authentication, they are more reliable and stronger than the best passwords. For example, no two people have the exact same fingerprint or retina pattern.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which software is Microsoft's anti-malware product that is preinstalled on most new computers?

ESET NOD32

Norton Antivirus

Windows Defender

McAfee VirusScan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company wants to use multifactor authentication. Which of the following would you most likely suggest?

Fingerprint and retinal scan

Password and passphrase

Token and smartphone

PIN and smart card

Answer explanation

Systems and accounts that need extra security often require multifactor authentication, generally from two or more types. This simply means you have to authenticate yourself two or more times to gain access to a system. Since a PIN is type 1 authentication and a smart card is type 2 authentication, these two would be considered multifactor authentication.

Since passwords and passphrases are both type 1, they would not amount to multifactor authentication.

Since security tokens and smartphones are both type 2, they would not amount to multifactor authentication.

Since fingerprints and retinal scans are both type 3, they would not amount to multifactor authentication.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A systems engineer is part of a company team creating a business continuity plan to recover critical data in case of a natural disaster.

Which of the following fault tolerance methods should the team include in the plan to be able to recover data? (Select two.)

Replication

Data Center

Power redundancy

Redundant Array of Independent Disks (RAID)

Site redundancy

Answer explanation

Site redundancy provides a complete duplicate of another location's computers and data. This is useful in the case of a major catastrophe, such as an earthquake or tornado, away from your main business location.

Replication is a data redundancy strategy where data is copied to a different physical location. This strategy works well in the case of a major catastrophe, such as an earthquake or tornado.

Power redundancy protects against service or data loss due to a power outage. However, if servers are destroyed during a natural disaster, power redundancy does not help to recover critical data.

Redundant Array of Independent Disks (RAID) is designed to store a duplicate of the same data on two or more disks simultaneously. If one disk fails, the data can still be accessed by using one of the other disks. However, this fault tolerance strategy does not address a natural disaster in which the entire RAID array is destroyed.

A data center is an area used to store and share such things as computer systems, applications, and data. However, during a natural disaster, a data center can be completely or partially destroyed.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of the following situations should you expect total privacy?

Instant messaging

Email messages and attachments

Social networking

Financial transactions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following authentication types include security questions as a factor for providing security?

Type 1 authentication

Type 2 authentication

Type 3 authentication

Single sign-on authentication

Answer explanation

Type 1 authentication (something you know) is by far the most common authentication type and includes security questions.

Type 2 authentication (something you have) does not include security questions.

Type 3 authentication (something you are) does not include security questions.

Single sign-on authentication is a method for logging into one system to gain access to other related systems. It is not a type of authentication and does not focus on security questions.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?

Multifactor authentication

VPN

Mandatory Access Control (MAC)

Single sign-on

Answer explanation

A VPN establishes a secure communications tunnel over a public network to a secure network. Using a VPN would provide secure transmission of the data.

The following do not secure the transmission of data over a public network:

Single sign-on is a method of authenticating with one system to gain access to other related systems.

Multifactor authentication requires two or more evidences of authentication, usually of different types.

Mandatory Access Control (MAC) is a type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?