8.1.3 practice questions
What is used to provide security groups access to system resources? Authorization ACL SID Access token
ACL
Inputting a username and password falls under which of the following? (Select two.) Identification Authentication Authorization Somewhere you are Something you do
Identification Authentication
A user connects to their bank's website. When the user logs in, the bank accepts the user credentials, and the user's web browser verifies the site's security certificates. Which security process is being used? Mutual authentication Something you know One-way authentication Multi-factor authentication
Mutual authentication
You want to increase security as users sign in to computers in the domain you administer. How can you implement the strongest form of multi-factor authentication? Require two-factor authentication. Require a password and a biometric scan. Require two passwords. Require a password, a biometric scan, and a token device.
Require a password, a biometric scan, and a token device.
Which of the following is included in an access token? (Select two.) Security group SIDs Machine name User's password User's SID User permissions
Security group SIDs User's SID
Which of the following are examples of the something you do authentication method? (Select two.) Supplying a smart card Taking a typing test Voice recognition Providing a username and password Handwriting sample
Taking a typing test Handwriting sample
Your Windows system has devices that are Personal Identity Verification (PIV) compliant. What can you do to implement a form of authentication that takes advantage of PIV? Use biometric authentication. Use certificate authentication. Use Kerberos authentication. Use smart card authentication.
Use smart card authentication.
What is the name of the process of submitting and checking credentials to validate or prove user identity? Authentication Identification Permission Authorization
authentication
What are the two types of groups Microsoft systems provide? Security Administrator User Distribution Power User
security distribution
Match each authentication method to the proper authentication factor. Factors may be used more than once. something you are something you know something you have something you do somewhere you are fingerprint password smartcard typing test RFID proximity reader PIN voice recog.
something you are something you know something you have something you do somewhere you are something you know something you are