CYB125 - Ch6

CYB125 - Ch6

University

40 Qs

quiz-placeholder

Similar activities

UAS Organisasi dan Arsitektur Komputer

UAS Organisasi dan Arsitektur Komputer

University

40 Qs

Linux File Permissions / commands Basic Quiz

Linux File Permissions / commands Basic Quiz

10th Grade - University

36 Qs

Information Security Basics Quiz

Information Security Basics Quiz

University

44 Qs

IST 166 Module 1

IST 166 Module 1

University

39 Qs

Jaringan Komputer dan Internet X SMA

Jaringan Komputer dan Internet X SMA

9th Grade - University

40 Qs

UAS SMP Informatika Kelas IX 2024-2025

UAS SMP Informatika Kelas IX 2024-2025

9th Grade - University

40 Qs

Computer Architecture Quiz 4

Computer Architecture Quiz 4

University

41 Qs

HPC 202/ TPC 202- Quiz # 1

HPC 202/ TPC 202- Quiz # 1

University

40 Qs

CYB125 - Ch6

CYB125 - Ch6

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Anonymous Anonymous

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?

Answers the question "who is asking to access the asset?"

Verifies that requestors are who they claim to be

Grants or denies a requestor access and what they can do on a network

Determines how actions can be traced to an individual

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?

Remote Authentication Dial-In User Service (RADIUS)

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a logical access control?

Key for a lock

Password

Access card

Fence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of authentication includes smart cards?

Knowledge

Ownership

Location

Action

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of two-factor authentication (2FA)?

Smart card and personal identification number (PIN)

PIN and password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?

Dictionary attack

Rainbow table attack

Social engineering attack

Brute-force attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?

Enables a 30-day password change policy

Requires all passwords to contain at least eight alphanumeric characters

Mandates that no password includes words common in an English dictionary

Forbids a password being changed to any of the previous 10 passwords listed in the password history

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?