Unit 1 Study Quiz Cybersecurity

¡Supera tus tareas y exámenes ahora con Quizwiz!

____ is an authentication scheme that allows a user to log in with a single ID and password to any of several related, yet independent, software systems. A. SSO B. ACA C. SMS D. PPG

A. SSO (Single Sign-on authentication with one set of credentials for multiple applications)

What is FAR? (False Acceptance Rate) A. The likelihood that an unauthorized user gains access to a system they don't belong to B. The likelihood that an authorized user is rejected from a system that they should have access to C. The likelihood that an unauthorized user is rejected from a system they don't have access to D. The likelihood that an authorized user gains access to a system they have access to

A. The likelihood that an unauthorized user gains access to a system they don't belong to

Which of the following passwords is the "strongest"? A. m@+H_1s_m3h- B. MyNameIsMud C. 8675309 D. Extrapolation

A. m@+H_1s_m3h-

______ is a general term denoting software services which utilize geographic data and information to provide services or information to users. A. Location-based services B. GPS C. IP address lookup D. None of the above

A. Location-based services

What does NTFS stand for? A. New Technology File System B. Never Tested File System C. Newly Tested File System D. Never Trust File System

A. New Technology File System

Which of the following is an example of "something you know"? A. A PIN B. An IP address C. A fingerprint D. Typing

A. A PIN

Which of the following is an example of "something you are"? A. A fingerprint B. A signature C. A password D. A smart card

A. A fingerprint

What is an HOTP? A. A one-time password with no time limit B. A one-time password with a short time limit C. A verification link sent to a user's cell phone D. A verification link sent to a user's email

A. A one-time password with no time limit (HMAC-Based One-time Password)

Which of the following is using GPS or RFID to outline geographical boundaries? A. Geofencing B. Geotagging C. Geolocation D. Geography

A. Geofencing

Which of the following is an example of "something you do"? A. Biometric readings B. A signature C. SMS token D. An iris scan

B. A signature

____ is a mechanism for software to prove its identity. A. Authentication B. Attestation C. Authorization D. Accounting

B. Attestation

What does the AAA in AAA framework stand for? A. Agricultural Adjustment Act B. Authentication, Authorization, and Accounting C. American Automobile Association D. Alexander, Anderson, and Achilles

B. Authentication, Authorization, and Accounting

What are biometrics? A. The weight and height of an individual B. Biological measurements that can be used to identify individuals C. A standard for the implementation of protocols for human integration D. None of the above

B. Biological measurements that can be used to identify individuals

____ provide information about systems, users, and other information regarding an organization. A. Naming conventions B. Directory services C. Rolodexes D. Databases

B. Directory services

Phone calls will only be used by scammers when trying to access an account. A. True B. False

B. False

Shared accounts are useful in business situations because it's easy to trace which employee has access to the system and when. A. True B. False

B. False

What term is used to describe using login credentials from one system to authorize and authenticate to another system? A. Lazy B. Federated network C. Multi Platform Synchronization D. None of the above

B. Federated network

____ that works by identifying a person's unique walking pattern. A. Stepping structure B. Gait analysis C. Hip-to-knee ratio D. None of the above

B. Gait analysis

What is another name for a shared account? A. Business account B. Generic account C. Professional account D. Multi-user account

B. Generic account

What is the remedy for a disabled account? A. Allowing for enough time to pass B. Reactivation C. Password reset D. None of the above

B. Reactivation

A guest account is most similar to what type of account? A. User B. Shared C. Service D. Privileged

B. Shared

Using remote attestation, a remote device runs an inventory of hardware and software, then encrypts and digitally signs the info using the ____ that is in the device. A. CPU B. TPM C. RAM D. PSU

B. TPM (Trusted Platform Module)

What is FRR? (False Rejection Rate) A. The likelihood that an unauthorized user gains access to a system they don't belong to B. The likelihood that an authorized user is rejected from a system that they should have access to C. The likelihood that an unauthorized user is rejected from a system they don't have access to D. The likelihood that an authorized user gains access to a system they have access to

B. The likelihood that an authorized user is rejected from a system they don't have access to

Which of the following is an example of "something you have"? A. An iris scan B. USB token C. A PIN D. An IP address

B. USB token

Which of the following is an example of "somewhere you are"? A. USB token B. SMS token C. An IP address D. A signature

C. An IP address

____ are physical or behavioral human characteristics that can be used to digitally identify a person to grant access to a system. A. PII B. Identification points C. Biometric readings D. Authentications

C. Biometric readings

Which of the following is an example of a user account? A. System administrator B. Generic business account C. Email account D. None of the above

C. Email account

____ is a feature of the Microsoft Windows NT family of operating systems that controls the working environment of user accounts and computer accounts. A. User Creation B. Environmental Access Control C. Group Policy D. Environmental Interface

C. Group Policy

A ______ is a useful method for slowing down online password-guessing. A. Time ban B. Denial of service C. Lockout D. Password reset

C. Lockout

What type of trust involves domain B trusting domain A, but domain A not trusting domain B? A. Non-transitive B. Transitive C. One-way D. Two-way

C. One-way

What is AAA Framework? A. A United States federal law of the New Deal era designed to boost agricultural prices by reducing surpluses. B. A list of the benefits package for members, including emergency roadside assistance, travel services, and insurance. C. The procedure for implements encryption and decryption tools throughout an organization. D. A simple way to understand security issues surrounding the access ability of individuals within an organization.

D. A simple way to understand security issues surrounding the access ability of individuals within an organization.

What is a service account? A. An account specifically for the download and installation of programs B. An internal account used by the OS C. An account used by maintenance D. All of the above

D. All of the above

What is the responsibility of an IdP? A. Validates provided credentials on cloud services B. Creates identity information C. Manages identity information D. All of the above

D. All of the above

Which of the following is an administrator capable of doing? A. Setting minimum and maximum password lengths B. Requiring smart cards C. Set the size of the security log D. All of the above

D. All of the above

Which of the following is an example of a privileged account? A. Service account B. Root account C. Administrator account D. All of the above

D. All of the above

Which of the following is an example of biometric factors? A. Fingerprint scanner B. Iris scanner C. Voice recognition D. All of the above

D. All of the above

____ are measurable physiological or behavioral characteristics which are used for biometrics. A. Human characteristics B. Mass spectrometry C. Shrink evaluations D. Biometric factors

D. Biometric factors

What does LDAP stand for? A. Listed Directory Access Protocol B. Logged Directory Access Protocol C. Licensed Directory Access Protocol D. Lightweight Directory Access Protocol

D. Lightweight Directory Access Protocol

What level of privileges does a user account have? A. Unrestricted B. High C. Medium D. Lowest

D. Lowest

The password recovery process should be a formal process because it is an opportunity for ______. A. Lockout B. Deactivation C. Annoyance D. Social engineering

D. Social engineering

____ change after a specific amount of time. A. Variable inputs B. Alternating credentials C. Federated identities D. Static codes

D. Static codes

What is CER? (Crossover Error Rate) A. The percent of unsuccessful logins B. The percent of successful logins C. The percent of unauthorized users attempting to gain access to a system D. The rate where both FAR and FRR are equal

D. The rate where both FAR and FRR are equal


Conjuntos de estudio relacionados

Intro to Supply Chain Management

View Set

The Scarlet Letter - Chapters 1-6

View Set

World History Midterm Study Guide CHAPTER 6

View Set

Blaw Ch. 14: Intellectual Property Rights (Exam 3)

View Set

AP Spanish Lectura/Audio Tema 2 (Ciencia y Tecnología)

View Set

Personal Finance Exam 4 Study Set

View Set