14.4.11 PQ NET126
Which of the following processes is used to prove a user's identity?
Authentication
Which of the following authentication combinations is an example of multi-factor authentication?
PIN and authentication app
Which of the following BEST describes authorization?
The resources that a user can access.
Which of the following is an example of a soft token?
A soft token is any digital authentication key that is used to authenticate a user. Of these options, only the authentication app is a soft token, since an authentication app is a digital app on a phone or tablet.
Which of the following does Windows use to manage and enforce what a user is authorized to access?
Access control list
You are working as a junior network technician at the local hospital. The security administrator has just finished rolling out a new security policy that requires users to log in to workstations using a fingerprint scanner. Which authentication category does this fall under?
Biometrics (fingerprint scanner) fall under the something you are authentication category.
Which of the following statements is true regarding hard tokens?
Hard tokens provide a higher level of security, but if the token is lost or stolen, the security breach can be quite severe. Implementing hard tokens can also be expensive and time-consuming. They are generally reserved for highly sensitive data.
Your company has recently implemented a BYOD policy. To protect the network, users must install an app on their devices that allows the security administrator to enforce the security policies. Which of the following is this an example of?
Mobile device management
You have been hired to assess a client's security. During your testing, you discover that users have access to other departments' files. Which of the following should you recommend that the company implement?
Principle of least privilege
Which authentication category does a username and password fall under?
Something you know