Ruth, a security professional, wanted to confirm the identity of newly joined employees. She sent email links of the company's portal to all the newly joined employees. The employees need to enter initial access token to login on to the portal, then they will receive an OTP on their mobile phone to upload their scanned certificate copies. Which of the following types of authentication has Ruth implemented in this scenario?

CyberSec-TestD

Quiz
•
Computers
•
Professional Development
•
Medium
Victor A
Used 3+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Password authentication
Two-factor authentication
Biometric authentication
Single sign-on (SSO) authentication
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Obi, a security specialist at an organization, was tasked with implementing an authentication mechanism for their employees. He employed an authentication mechanism that scans the facial features of employees and compares them with the patterns stored in the database. ........ authentication method was implemented by Obi here. (One word only)
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following types of accounts are the default accounts of operating systems and run with the least privileges, with permissions such as running applications and creating and manipulating files that belong to their profile? (Two Correct Answers)
User accounts
Guest accounts
Root accounts
Privileged accounts
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Fumilayo, a security professional, was instructed to limit employees’ access to critical resources. For this purpose, she implemented an access principle that provides permission to access only necessary resources that are required for their job tasks. The permissions can be extended later based on changes in their job roles. Identify the access principle implemented by Fumilayo in this situation.
Separation of duties
Need-to-know
Principle of least privilege
Rule-based access control
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Bello, an employee at a software company, needs to log in every day before starting his work. The company has a separate HR portal for maintaining employee attendance details. Every day, Bello accesses the portal, provides his credentials, and logs in before starting his work. The ............... authentication method is demonstrated in the above scenario. (One word only)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the access control principle that ensures that no single individual has the authorization rights to perform all functions and simultaneously denies access of all the objects to a single individual.
Principle of highest privilege (PoHP)
Separation of Duties (SoD)
Need-to-know principle
Discretionary Access control (DAC)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Okon, a network administrator, was assigned a task to create a standard access control model for the organization's confidential data. He implemented an access control model that determines the usage and access policies for the users. After its implementation, only users with appropriate access rights can access the resource. Which of the following access control models has Okon implemented in the cited scenario above?
Mandatory access control (MAC)
Discretionary access control (DAC)
Role-based access control (RBAC)
Rule-based access control (RB-RBAC)
Create a free account and access millions of resources
Similar Resources on Wayground
35 questions
A+ 1102 Day 4a ITSA 2.1 Summarize security measures

Quiz
•
Professional Development
29 questions
A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

Quiz
•
Professional Development
26 questions
Part III-Practice Study Guide (ITF+)

Quiz
•
Professional Development
30 questions
Comptia Security+ Understanding Application Attacks and security

Quiz
•
Professional Development
25 questions
security+ (601)

Quiz
•
9th Grade - Professio...
30 questions
Linux Understanding Basic Security in Linux

Quiz
•
Professional Development
25 questions
CompTIA Security+ Certification Exam SY0-701 Practice Test 1

Quiz
•
Professional Development
30 questions
Sec+ Day 2 Cryptographic Solutions and Identity Management Quiz

Quiz
•
Professional Development
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade