Unit 1 Study Quiz Cybersecurity
____ is an authentication scheme that allows a user to log in with a single ID and password to any of several related, yet independent, software systems. A. SSO B. ACA C. SMS D. PPG
A. SSO (Single Sign-on authentication with one set of credentials for multiple applications)
What is FAR? (False Acceptance Rate) A. The likelihood that an unauthorized user gains access to a system they don't belong to B. The likelihood that an authorized user is rejected from a system that they should have access to C. The likelihood that an unauthorized user is rejected from a system they don't have access to D. The likelihood that an authorized user gains access to a system they have access to
A. The likelihood that an unauthorized user gains access to a system they don't belong to
Which of the following passwords is the "strongest"? A. m@+H_1s_m3h- B. MyNameIsMud C. 8675309 D. Extrapolation
A. m@+H_1s_m3h-
______ is a general term denoting software services which utilize geographic data and information to provide services or information to users. A. Location-based services B. GPS C. IP address lookup D. None of the above
A. Location-based services
What does NTFS stand for? A. New Technology File System B. Never Tested File System C. Newly Tested File System D. Never Trust File System
A. New Technology File System
Which of the following is an example of "something you know"? A. A PIN B. An IP address C. A fingerprint D. Typing
A. A PIN
Which of the following is an example of "something you are"? A. A fingerprint B. A signature C. A password D. A smart card
A. A fingerprint
What is an HOTP? A. A one-time password with no time limit B. A one-time password with a short time limit C. A verification link sent to a user's cell phone D. A verification link sent to a user's email
A. A one-time password with no time limit (HMAC-Based One-time Password)
Which of the following is using GPS or RFID to outline geographical boundaries? A. Geofencing B. Geotagging C. Geolocation D. Geography
A. Geofencing
Which of the following is an example of "something you do"? A. Biometric readings B. A signature C. SMS token D. An iris scan
B. A signature
____ is a mechanism for software to prove its identity. A. Authentication B. Attestation C. Authorization D. Accounting
B. Attestation
What does the AAA in AAA framework stand for? A. Agricultural Adjustment Act B. Authentication, Authorization, and Accounting C. American Automobile Association D. Alexander, Anderson, and Achilles
B. Authentication, Authorization, and Accounting
What are biometrics? A. The weight and height of an individual B. Biological measurements that can be used to identify individuals C. A standard for the implementation of protocols for human integration D. None of the above
B. Biological measurements that can be used to identify individuals
____ provide information about systems, users, and other information regarding an organization. A. Naming conventions B. Directory services C. Rolodexes D. Databases
B. Directory services
Phone calls will only be used by scammers when trying to access an account. A. True B. False
B. False
Shared accounts are useful in business situations because it's easy to trace which employee has access to the system and when. A. True B. False
B. False
What term is used to describe using login credentials from one system to authorize and authenticate to another system? A. Lazy B. Federated network C. Multi Platform Synchronization D. None of the above
B. Federated network
____ that works by identifying a person's unique walking pattern. A. Stepping structure B. Gait analysis C. Hip-to-knee ratio D. None of the above
B. Gait analysis
What is another name for a shared account? A. Business account B. Generic account C. Professional account D. Multi-user account
B. Generic account
What is the remedy for a disabled account? A. Allowing for enough time to pass B. Reactivation C. Password reset D. None of the above
B. Reactivation
A guest account is most similar to what type of account? A. User B. Shared C. Service D. Privileged
B. Shared
Using remote attestation, a remote device runs an inventory of hardware and software, then encrypts and digitally signs the info using the ____ that is in the device. A. CPU B. TPM C. RAM D. PSU
B. TPM (Trusted Platform Module)
What is FRR? (False Rejection Rate) A. The likelihood that an unauthorized user gains access to a system they don't belong to B. The likelihood that an authorized user is rejected from a system that they should have access to C. The likelihood that an unauthorized user is rejected from a system they don't have access to D. The likelihood that an authorized user gains access to a system they have access to
B. The likelihood that an authorized user is rejected from a system they don't have access to
Which of the following is an example of "something you have"? A. An iris scan B. USB token C. A PIN D. An IP address
B. USB token
Which of the following is an example of "somewhere you are"? A. USB token B. SMS token C. An IP address D. A signature
C. An IP address
____ are physical or behavioral human characteristics that can be used to digitally identify a person to grant access to a system. A. PII B. Identification points C. Biometric readings D. Authentications
C. Biometric readings
Which of the following is an example of a user account? A. System administrator B. Generic business account C. Email account D. None of the above
C. Email account
____ is a feature of the Microsoft Windows NT family of operating systems that controls the working environment of user accounts and computer accounts. A. User Creation B. Environmental Access Control C. Group Policy D. Environmental Interface
C. Group Policy
A ______ is a useful method for slowing down online password-guessing. A. Time ban B. Denial of service C. Lockout D. Password reset
C. Lockout
What type of trust involves domain B trusting domain A, but domain A not trusting domain B? A. Non-transitive B. Transitive C. One-way D. Two-way
C. One-way
What is AAA Framework? A. A United States federal law of the New Deal era designed to boost agricultural prices by reducing surpluses. B. A list of the benefits package for members, including emergency roadside assistance, travel services, and insurance. C. The procedure for implements encryption and decryption tools throughout an organization. D. A simple way to understand security issues surrounding the access ability of individuals within an organization.
D. A simple way to understand security issues surrounding the access ability of individuals within an organization.
What is a service account? A. An account specifically for the download and installation of programs B. An internal account used by the OS C. An account used by maintenance D. All of the above
D. All of the above
What is the responsibility of an IdP? A. Validates provided credentials on cloud services B. Creates identity information C. Manages identity information D. All of the above
D. All of the above
Which of the following is an administrator capable of doing? A. Setting minimum and maximum password lengths B. Requiring smart cards C. Set the size of the security log D. All of the above
D. All of the above
Which of the following is an example of a privileged account? A. Service account B. Root account C. Administrator account D. All of the above
D. All of the above
Which of the following is an example of biometric factors? A. Fingerprint scanner B. Iris scanner C. Voice recognition D. All of the above
D. All of the above
____ are measurable physiological or behavioral characteristics which are used for biometrics. A. Human characteristics B. Mass spectrometry C. Shrink evaluations D. Biometric factors
D. Biometric factors
What does LDAP stand for? A. Listed Directory Access Protocol B. Logged Directory Access Protocol C. Licensed Directory Access Protocol D. Lightweight Directory Access Protocol
D. Lightweight Directory Access Protocol
What level of privileges does a user account have? A. Unrestricted B. High C. Medium D. Lowest
D. Lowest
The password recovery process should be a formal process because it is an opportunity for ______. A. Lockout B. Deactivation C. Annoyance D. Social engineering
D. Social engineering
____ change after a specific amount of time. A. Variable inputs B. Alternating credentials C. Federated identities D. Static codes
D. Static codes
What is CER? (Crossover Error Rate) A. The percent of unsuccessful logins B. The percent of successful logins C. The percent of unauthorized users attempting to gain access to a system D. The rate where both FAR and FRR are equal
D. The rate where both FAR and FRR are equal