Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?

CYB125 - Ch6

Quiz
•

Damon Vogel
•
Information Technology (IT)
•
University
•
1 plays
•
Hard
Student preview

40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Answers the question "who is asking to access the asset?"
Verifies that requestors are who they claim to be
Grants or denies a requestor access and what they can do on a network
Determines how actions can be traced to an individual
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?
Remote Authentication Dial-In User Service (RADIUS)
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of a logical access control?
Key for a lock
Password
Access card
Fence
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of authentication includes smart cards?
Knowledge
Ownership
Location
Action
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of two-factor authentication (2FA)?
Smart card and personal identification number (PIN)
PIN and password
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?
Dictionary attack
Rainbow table attack
Social engineering attack
Brute-force attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?
Enables a 30-day password change policy
Requires all passwords to contain at least eight alphanumeric characters
Mandates that no password includes words common in an English dictionary
Forbids a password being changed to any of the previous 10 passwords listed in the password history
Explore all questions with a free account
Similar Resources on Quizizz
44 questions
A+ Core II Days 7-9

Quiz
•
University
40 questions
System Administrator Activities Quiz

Quiz
•
University
45 questions
IT2112 Networking 1 Quiz 1

Quiz
•
University
35 questions
Дилнура

Quiz
•
University
43 questions
MGMT 2080 - Exam 2

Quiz
•
University
40 questions
Long Quiz # 2 System Administration Activities

Quiz
•
University
40 questions
Quiz-Applied OS

Quiz
•
University
40 questions
IT3182 Cryptology and Network Security Midterm Exam

Quiz
•
University
Popular Resources on Quizizz
39 questions
Respect and How to Show It

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
10 questions
Human Body Systems and Functions

Interactive video
•
6th - 8th Grade
20 questions
Multiplication Facts

Quiz
•
3rd Grade
Discover more resources for Information Technology (IT)
20 questions
Summer

Quiz
•
KG - University
19 questions
Minecraft

Quiz
•
6th Grade - Professio...
20 questions
3rd Grade Review

Quiz
•
KG - University
15 questions
Minecraft

Quiz
•
University
52 questions
Logos Trivia

Quiz
•
KG - University
7 questions
New national park celebrates Harriet Tubman's legacy

Interactive video
•
11th Grade - University
8 questions
2 Step Word Problems

Quiz
•
KG - University
20 questions
Disney characters

Quiz
•
KG - Professional Dev...