Module 12 Virtual Lab | ITE-249-02
3. Multi-factor authentication involves how many minimum methods to authenticate a user? 1 2 4 3
2
4. How many entities are involved in the 802.1x authentication process? 3 4 1 2
3
12.1: 1. Which of the following is considered as the root of the Active Directory hierarchy? Organizational Units Domain Site Forest
Forest
5. Which of the following authentication method can use location to authenticate a user? Rule-based Access Control (RBAC) Attribute-based Access Control (ABAC) Mandatory Access Control (MAC) Role-based Access Control (RBAC)
Attribute-based Access Control (ABAC)
2. Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply] Cryptographic function offloading from a server Encryption and Decryption User Password Management Encryption Keys Management Key Exchange
Cryptographic function offloading from a server Encryption and Decryption Encryption Keys Management Key Exchange
12.2: 1. Which of the following is required for two-factor authentication? [Choose all that apply] Smart card Password key USB drive Password
Smart card Password key Password
2. Which of the following statements describe the function of a Trusted Platform Module (TPM)? [Choose all that apply] Storage of encryption keys Storage of certificates Management of encryption keys Perform encryption and decryption process
Storage of encryption keys Storage of certificates Management of encryption keys Perform encryption and decryption process
5. Which of the following factor is critical in the Gait analysis? Body language Way of talking Way of walking Head movement
Way of walking
4. Which of the following type of scanner scans for features, such as the shape, size, and position of the ear, nose, and eyes? Fingerprint Iris Facial Retina
Facial
3. Which of the following protocol uses port-based authentication? Extensible Authentication Protocol (EAP) 802.1X Challenge Handshake Authentication Protocol (CHAP) Password Authentication Protocol (PAP)
802.1X