
Unit 5 - Authentication and Security Protocols - Cyber 24-25
Authored by Cody Diliberto
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
______ provide information about systems, users, and other information regarding an organization.
Directory services
Naming conventions
Rolodexes
Databases
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phone calls will only be used by scammers when trying to access an account.
False
True
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are biometrics
Biological measurements that can be used to identify individuals
The weight and height of an individual
A standard for the implementation of protocols for human integration
None of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of biometric factors?
All of the above
Voice recognition
Iris scanner
Fingerprint scanner
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of "something you are"?
A fingerprin
A signature
A password
A smart card
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of "something you know"?
A PIN
An IP address
A fingerprint
Typing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a user account?
Email account
None of the above
Generic business account
System administrator
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?