0% found this document useful (0 votes)
248 views1 page

Quiz - Authentication and Access Control - Attempt Review

The document is a summary of a user's completion of an online cybersecurity course. It provides details of the user's completion including starting and finishing times, scores on 10 multiple choice questions, and an overall grade and completion status.

Uploaded by

lita941227
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
248 views1 page

Quiz - Authentication and Access Control - Attempt Review

The document is a summary of a user's completion of an online cybersecurity course. It provides details of the user's completion including starting and finishing times, scores on 10 multiple choice questions, and an overall grade and completion status.

Uploaded by

lita941227
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

 Library Schedule Certifications ATC Academic Partner Program Fast Track Workshops  

 FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced


 FCF - Technical
Introduction to
Cybersecurity 1.0 Self- Started on Wednesday, April 24, 2024, 1:09 AM
Paced State Finished
Completed on Wednesday, April 24, 2024, 1:16 AM
 Dashboard Time taken 6 mins 50 secs
Points 10/10
 Achievements Grade 100 out of 100
Feedback Congratulations, you passed!
 Library

 Schedule Question 1 What does a NAC use to identify attached devices and allow access?
Correct

1 points out of 1 Select one:


Flag question Device profile
Username
Device memory size
Retinal pattern

Question 2 Which two are aspects of the principle of least privilege? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Allowing only what users and devices need
Allowing access until proven otherwise
Allowing easy, baseline access for all
Reducing error by minimizing access

Question 3 Which three can be used as attributes in attribute-based access control? (Choose three.)
Correct

1 points out of 1 Select one or more:


Flag question MAC address
Hours in a day
Time of day
DHCP IP address

Question 4 Which two should be selected to create secure multi-factor authentication to access a computer system? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Height sensor
Voice identification
Password
Smart Card

Question 5 Which one makes the allow or deny decision in the authentication process?
Correct

1 points out of 1 Select one:


Flag question Intermediary
Supplicant
Access point
Authentication server

Question 6 In SSO authentication, which two entities know the unhashed credentials? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Identify provider
User
Internet service provider
Service provider

Question 7 Which type of access control scheme does a NAC apply?


Correct

1 points out of 1 Select one:


Flag question Lattice-based access control
Mandatory access control
Discretionary access control
Attribute-based access control

Question 8 What type of access control allows the device or person performing the authentication the ability to allow or deny access?
Correct

1 points out of 1 Select one:


Flag question Discretionary access control
Mandatory access control
Lattice-based access control
Role-based access control

Question 9 Which two are the responsibilities of an authentication governing body? (Choose two.)
Correct

1 points out of 1 Select one or more:


Flag question Reviewing the password strength policy
User certification
User onboarding
Creating disaster recovery policies

Question 10 Which protocol can perform SSO?


Correct

1 points out of 1 Select one:


Flag question DNS
CHAP
TCP
Kerberos

Start another attempt Back to the course

You are logged in as Paula Monroy (Log out)

You might also like