8.1.3 practice questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is used to provide security groups access to system resources? Authorization ACL SID Access token

ACL

Inputting a username and password falls under which of the following? (Select two.) Identification Authentication Authorization Somewhere you are Something you do

Identification Authentication

A user connects to their bank's website. When the user logs in, the bank accepts the user credentials, and the user's web browser verifies the site's security certificates. Which security process is being used? Mutual authentication Something you know One-way authentication Multi-factor authentication

Mutual authentication

You want to increase security as users sign in to computers in the domain you administer. How can you implement the strongest form of multi-factor authentication? Require two-factor authentication. Require a password and a biometric scan. Require two passwords. Require a password, a biometric scan, and a token device.

Require a password, a biometric scan, and a token device.

Which of the following is included in an access token? (Select two.) Security group SIDs Machine name User's password User's SID User permissions

Security group SIDs User's SID

Which of the following are examples of the something you do authentication method? (Select two.) Supplying a smart card Taking a typing test Voice recognition Providing a username and password Handwriting sample

Taking a typing test Handwriting sample

Your Windows system has devices that are Personal Identity Verification (PIV) compliant. What can you do to implement a form of authentication that takes advantage of PIV? Use biometric authentication. Use certificate authentication. Use Kerberos authentication. Use smart card authentication.

Use smart card authentication.

What is the name of the process of submitting and checking credentials to validate or prove user identity? Authentication Identification Permission Authorization

authentication

What are the two types of groups Microsoft systems provide? Security Administrator User Distribution Power User

security distribution

Match each authentication method to the proper authentication factor. Factors may be used more than once. something you are something you know something you have something you do somewhere you are fingerprint password smartcard typing test RFID proximity reader PIN voice recog.

something you are something you know something you have something you do somewhere you are something you know something you are


Set pelajaran terkait

Intro to Accounting Chapter 21 Smartbook

View Set

Management-Hurley- FE, MS, and Cardiac-Delegation Quiz 1

View Set

Chapter quiz life insurance policy provisions, options and riders

View Set

Study for exam 1 computer forensics

View Set

Principios de Microeconomía - Capítulo 1: ¿Qué es la economía?

View Set

Physically & Developmentally Impaired Patients Quiz

View Set