3.1 quizz

3.1 quizz

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Cyber Security - S2 Knowledge Check

Cyber Security - S2 Knowledge Check

3rd - 12th Grade

6 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

QUIZ CHAPTER 3 : MOBILE DEVICES

QUIZ CHAPTER 3 : MOBILE DEVICES

6th - 8th Grade

13 Qs

Cybersecurity Fundamentals Week 2 Quiz

Cybersecurity Fundamentals Week 2 Quiz

KG - University

10 Qs

Domains1&2 Vocab

Domains1&2 Vocab

KG - 12th Grade

15 Qs

NETWORK SECURITY

NETWORK SECURITY

8th - 10th Grade

15 Qs

Year 9 L6 SECURITY part 1

Year 9 L6 SECURITY part 1

8th Grade

11 Qs

Google Docs Sharing and Permissions

Google Docs Sharing and Permissions

6th - 8th Grade

10 Qs

3.1 quizz

3.1 quizz

Assessment

Quiz

Computers

6th - 8th Grade

Medium

Created by

Philan Burleson

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication method identifying measurable patterns in human activities.

behavioral biometrics

crossover error rate (CER)

LDAPS

Discretionary Access Control (DAC)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Physical token inserted into a computer's USB port.

Kerberos

LDAPS

Dongle

New Technology File System (NTFS) permissions

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Closing or locking down any unnecessary paths on an operating system that can be used for unapproved access.

hardening

explicit permissions

Discretionary Access Control (DAC)

LDAPS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users cycle through different roles.

permission

job rotation

Lightweight Directory Access Protocol (LDAP)

implicit permissions

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication method using measurement and analysis of a biological feature.

multifactor authentication

behavioral biometrics

New Technology File System (NTFS) permissions

biometrics

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Service running on a server that has a copy of the Active Directory to manage the main functions of Authentication Service (AS) exchange and Ticket Granting Service (TGS) exchange.

secondary logon

false rejection rate.

Key Distribution Center (KDC)

single-sign-on (SSO)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ratio of the number of false acceptances divided by the number of identification attempts.

behavioral biometrics

right

Role-Based Access Control (RBAC)

false acceptance rate (FAR)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?