
CYB125 - Ch6

Quiz
•
Information Technology (IT)
•
University
•
Hard

Anonymous Anonymous
Used 1+ times
FREE Resource
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?
Answers the question "who is asking to access the asset?"
Verifies that requestors are who they claim to be
Grants or denies a requestor access and what they can do on a network
Determines how actions can be traced to an individual
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?
Remote Authentication Dial-In User Service (RADIUS)
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of a logical access control?
Key for a lock
Password
Access card
Fence
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of authentication includes smart cards?
Knowledge
Ownership
Location
Action
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of two-factor authentication (2FA)?
Smart card and personal identification number (PIN)
PIN and password
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?
Dictionary attack
Rainbow table attack
Social engineering attack
Brute-force attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?
Enables a 30-day password change policy
Requires all passwords to contain at least eight alphanumeric characters
Mandates that no password includes words common in an English dictionary
Forbids a password being changed to any of the previous 10 passwords listed in the password history
Create a free account and access millions of resources
Similar Resources on Wayground
41 questions
JABA!

Quiz
•
University
41 questions
GEC9 Midterm Exam (2nd Sem. 2024-2025)

Quiz
•
University
37 questions
ITEL 605 Midterm Examination

Quiz
•
University
37 questions
CompTIA Network+ Quiz

Quiz
•
University
45 questions
IT2112 Networking 1 Quiz 1

Quiz
•
University
43 questions
MGMT 2080 - Exam 2

Quiz
•
University
40 questions
Quiz IT Manajemen

Quiz
•
University
40 questions
40 новый

Quiz
•
University
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
11 questions
NFL Football logos

Quiz
•
KG - Professional Dev...
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
38 questions
Unit 6 Key Terms

Quiz
•
11th Grade - University
20 questions
La Hora

Quiz
•
9th Grade - University
7 questions
Cell Transport

Interactive video
•
11th Grade - University
7 questions
What Is Narrative Writing?

Interactive video
•
4th Grade - University