chapter 4 mcq exam

0.0(0)
studied byStudied by 8 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards
c) passwords
which of the following is the most common type of authentication method?

a) handwritten notes from administrators

b) public keys

c) passwords

d) common access card
2
New cards
a) authentication
the digital process of validating a user’s identity is referred to as ______.

a) authentication

b) utilization

c) implementation

d) single sign-on
3
New cards
d) users
______ are often the largest vulnerabilities of an organization and its data.

a) lack of transparencies

b) inertia tactics

c) organizational turnovers

d) users
4
New cards
d) authentication, authorization, and accounting
the AAA process consists of ______.

a) authentication, authorization, and access

b) authorization, accessibility, and identification

c) accounting, authentication, access management

d) authentication, authorization, and accounting
5
New cards
b) token
which of the following is a device that acts a key to gain access to a resource?

a) common access card

b) token

c) captive portal

d) multifactor access key
6
New cards
d) all of the above
which of the following is a factor of evidence to provide proof of identity of a user?

a) something you know

b) something you have

c) something you are

d) all of the above
7
New cards
b) what you know
when accessing certain programs or websites, a user might be asked to provide a password. a password is considered _____.

a) what you have

b) what you know

c) what you are

d) what you do
8
New cards
a) something you have
the _______ method is considered using a physical method that grants a user authorization to devices and data with devices such as common access cards.

a) something you have

b) something you are

c) something you see

d) something you know
9
New cards
c) what you are
biometric authentication is a form of authentication classified as ______.

a) what you have

b) what you know

c) what you are

d) what you do
10
New cards
d) geofencing
______ allows the managing of a geographical area to disable or enable devices and features based on the users’ proximity in a certain area.

a) geolocation

b) GPS tagging

c) bluejacking

d) geofencing
11
New cards
b) determines the time and days users have access to the network and its data
which of the following best describes the function of time-of-day restrictions?

a) provides a schedule of when users typically log on

b) determines the time and days users have access to the network and its data

c) provides users with an on-boarding process

d) provides users with an off-boarding process
12
New cards
a) single sign-on
which of the following protocols allows a user to provide a username and password once in order to obtain multiple resources?

a) single sign-on

b) manage access control

c) role-based access control

d) secondary logon
13
New cards
c) remote authentication dial-in user service
______ is a connectionless protocol that utilizes the User Datagram Protocol (UDP) as a transport layer protocol.

a) terminal access controller access-control system

b) transport control protocol (TCP)

c) remote authentication dial-in user service

d) internet protocol (IP)
14
New cards
d) behavioral
________ biometrics is the ability to measure patterns of human activity for authentication.

a) access management

b) GPS

c) biological

d) behavioral
15
New cards
b) multifactor
when a user is required to enter multiple independent credentials rather than just one for authentication, the user complying with ________ authentication.

a) single-factor

b) multifactor

c) authenticity-factor

d) mandatory access
16
New cards
b) complex password
the password “Whcejjtb3889642!\*rt$” is an example of a _______.

a) weak password

b) complex password

c) behavioral biometric

d) cognitive biometric
17
New cards
c) somewhere you are
which of the following forms of authentication would most likely employ a fingerprint scanner?

a) something you do

b) something you are

c) somewhere you are

d) something you know
18
New cards
a) access management controls
which of the following gives users access to resources and data on a network?

a) access management controls

b) unique passwords

c) biometrics

d) group policy objects
19
New cards
a) TACAS/TACACS+
________ is a remote Cisco proprietary protocol that provides authentication by forwarding user credentials to a central server for access of data and resources on a network.

a) TACAS/TACACS+

b) RADIUS

c) SOAR

d) kerberos
20
New cards
c) personnel
which of the following is *not* considered an account type?

a) shared

b) guest

c) personnel

d) privileged
21
New cards
b) local
a(n) _______ policy establishes the rights on a user’s local computer.

a) group

b) local

c) password

d) administrative
22
New cards
c) group
an Active Directory and the users’ rights saved to a server on a network is referred to as _______ policy.

a) password

b) local

c) group

d) network
23
New cards
d) trust relationships
a logical link formed between two separate domains is called _________.

a) active directory

b) exchange server

c) IMAP

d) trust relationships
24
New cards
a) an agreement between organizations that allows a user to have the same credentials for more than one organization
which of the following best describes federated identity management?

a) an agreement between organizations that allows a user to have the same credentials for more than one organization

b) an agreemenet between an administrator and a CEO regarding login credentials for users

c) both A and B

d) none of the above