Live Virtual Lab 12.1: Module 12 Authentication and Authorization Implementation Techniques
Which of the following factor is critical in the Gait analysis? A. Head movement B. Way of talking C. Way of walking D. Body language
Way of walking Gait Analysis detects an individual based on a specific style of walking. Using the Gait analysis, a person can be recognized and authenticated the way a person walks.
Multi-factor authentication involves how many minimum methods to authenticate a user? A. 3 B. 1 C. 4 D. 2
2
Which of the following statements describe the function of a Trusted Platform Module (TPM)? [Choose all that apply] - Storage of certificates - Storage of encryption keys - Management of encryption keys - Perform encryption and decryption process
All of the above Motherboards of the modern systems include a Trusted Platform Module (TPM) chip. This chip provides a hardware root of trust for secure computing. You can configure the TPM by accessing the BIOS of the system. TPM can perform various functions, such as: Storage of encryption keys Management of encryption keys Encryption and decryption process Storage of certificates Storage of passwords In addition, you can configure TPM to perform full disk encryption (FDE). Moreover, TPM performs a complete system check. Further, it verifies the system integrity and the integrity of the entire boot process within a system.
Which of the following type of scanner scans for features, such as the shape, size, and position of the ear, nose, and eyes? A. Fingerprint B. Iris C. Facial D. Retina
Facial
Which of the following is considered as the root of the Active Directory hierarchy? A. Organizational Units B. Domain C. Forest D. Site
Forest