Exam 11: Authentication and Account Management
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
What kind of biometrics utilizes a person's unique physical characteristics for authentication,such as fingerprints or unique characteristics of a person's face?
(Multiple Choice)
4.8/5
(32)
Which of the following is NOT a valid biometric disadvantage?
(Multiple Choice)
4.8/5
(33)
What technology is an open source federation framework and supports the development of authorization protocols?
(Multiple Choice)
4.9/5
(36)
Which of the following is a category of group password settings in Microsoft Windows? (Choose all that apply. )
(Multiple Choice)
4.8/5
(47)
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
(Multiple Choice)
4.8/5
(29)
A secret combination of letters,numbers,and/or characters that only the user should have knowledge of,is known as a:
(Multiple Choice)
4.8/5
(30)
What are the three advantages of a rainbow table over other password attacks?
(Essay)
4.8/5
(39)
Which of the following is a is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest?
(Multiple Choice)
4.9/5
(24)
Brute force attacks can be very slow because every character combination must be generated.
(True/False)
4.8/5
(36)
What type of card contains an integrated circuit chip that can hold information,which then can be used as part of the authentication process?
(Multiple Choice)
4.9/5
(36)
What type of attack conducts a statistical analysis of the stolen passwords that is then used to create a mask to break the largest number of passwords?
(Multiple Choice)
4.7/5
(25)
Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server?
(Multiple Choice)
4.8/5
(37)
Which term below describes the time it takes for a key to be pressed and then released?
(Multiple Choice)
4.8/5
(29)
The use of one authentication credential to access multiple accounts or applications is referred to as which of the following?
(Multiple Choice)
4.9/5
(36)
Open ID Connect is an Authentication protocol that can be used in OAuth 2.0 as a standard means to obtain user identity.
(True/False)
4.8/5
(38)
What specific type of authentication can be based on where the user is located?
(Multiple Choice)
4.8/5
(41)
A retina scanner has become the most common type of standard biometrics.
(True/False)
4.9/5
(32)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)