CYB125 - Ch6

CYB125 - Ch6

Assessment

Quiz

Created by

Damon Vogel

Information Technology (IT)

University

1 plays

Hard

Student preview

quiz-placeholder

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?

Answers the question "who is asking to access the asset?"

Verifies that requestors are who they claim to be

Grants or denies a requestor access and what they can do on a network

Determines how actions can be traced to an individual

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?

Remote Authentication Dial-In User Service (RADIUS)

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a logical access control?

Key for a lock

Password

Access card

Fence

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of authentication includes smart cards?

Knowledge

Ownership

Location

Action

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of two-factor authentication (2FA)?

Smart card and personal identification number (PIN)

PIN and password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?

Dictionary attack

Rainbow table attack

Social engineering attack

Brute-force attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?

Enables a 30-day password change policy

Requires all passwords to contain at least eight alphanumeric characters

Mandates that no password includes words common in an English dictionary

Forbids a password being changed to any of the previous 10 passwords listed in the password history

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?