SY0-601 Practice Test 9

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Examples of MFA attributes include: (Select all that apply)

- Handwritten signature - Gait analysis - GPS reading - Chain of trust

Which of the following are examples of hardware authentication tokens? (Select 3 answers)

- Key fob - RFID badge - Smart card

Which of the following fall into the category of MFA factors? (Select 3 answers)

- PIN - USB token - Retina scan

Hardware RAID Level 0: (Select all that apply)

- Requires a minimum of 2 drives to implement - Is also known as disk striping - Decreases reliability (failure of any disk in the array destroys the entire array) - Is suitable for systems where performance has higher priority than fault tolerance

Examples of static authentication methods include: (Select 2 answers)

- User-generated password - Personal Identification Number (PIN)

Which of the following answers refer to the characteristics of HOTP? (Select 3 answers)

- Valid for only one login session - Not vulnerable to replay attacks - Based on a cryptographic hash function and a secret cryptographic key

Which of the following answers describe the features of TOTP? (Select 3 answers)

- Valid for only one login session - Not vulnerable to replay attacks - Based on a shared secret key and current time

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:

Accounting

A type of hierarchical database structure used in Windows Server environments that enables centralized management of users, devices and resources on a network is known as:

Active Directory (AD)

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

Authentication

Which of the following is an example of a soft authentication token?

Authenticator app

Which of the answers listed below refers to the process of granting or denying access to resources?

Authorization

Which of the answers listed below refers to a type of metric used for evaluation of a biometric security system's accuracy?

CER

A measure of the likelihood that a biometric security system will incorrectly accept an access attempt by an unauthorized user is known as:

FAR

A measure of the likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user is referred to as:

FRR

An authentication subsystem in which a single set of authentication credentials provides access to multiple systems across different organizations is called:

Federation

Which of the following examples meets the requirement of multifactor authentication?

Password and biometric scan

Which of the following RAID levels does not offer fault tolerance?

RAID 0

A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is referred to as:

Redundant Array of Independent Disks (RAID)

Which of the following answers refers to an example implementation of certificate-based authentication?

Smart card

An authenticator application is a software that generates additional authentication token (in the form of a random code) used in multi-step verification process.

True

Authentication process can be based on various categories of authentication factors and attributes. Authentication factors include unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or usernames and passwords ("something you know"). The categories of authentication attributes include geolocation ("somewhere you are"), user-specific activity patterns, such as keyboard typing style ("something you can do"), revealing something about an individual, e.g. wearing an ID badge ("something you exhibit"), or proving the relation with a trusted third party ("someone you know"). Multifactor authentication systems require implementation of authentication factors from two or more distinct categories.

True

In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes.

True


Kaugnay na mga set ng pag-aaral

Med-Surg Exam #2 Practice Questions

View Set

Computer Forensics and Security: Chapter 3: Digital Evidence in the Court Room

View Set

Using Commas: Introductory Phrases and Clauses

View Set

Constitutional Government Chapter 2

View Set

All important terms life insurance questions and ultimate study guide

View Set

Chapter 29 Perioperative Nursing

View Set