Quiz Summary
0 of 14 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 14 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 14
1. Question
Which property of a plaintext password is most effective at defeating a brute force attack?
CorrectIncorrect -
Question 2 of 14
2. Question
A user keeps a list of commonly used passwords in a hidden file deep within the computer’s directory structure. Is this secure password management?
CorrectIncorrect -
Question 3 of 14
3. Question
What policy prevents users from reusing old passwords?
CorrectIncorrect -
Question 4 of 14
4. Question
True or False: An account requiring a password, PIN, and smart card is an example of three-factor authentication.
CorrectIncorrect -
Question 5 of 14
5. Question
Which of the following methods can be used for location-based authentication?
CorrectIncorrect -
Question 6 of 14
6. Question
Apart from cost, what are the major considerations when evaluating biometric recognition technology?
CorrectIncorrect -
Question 7 of 14
7. Question
True or False: In smart card login, the user’s private key is stored on the smart card.
CorrectIncorrect -
Question 8 of 14
8. Question
How does a one-time password (OTP) protect against password compromise?
CorrectIncorrect -
Question 9 of 14
9. Question
What is the main difference between security group–based and role-based permissions management?
CorrectIncorrect -
Question 10 of 14
10. Question
In a rule-based access control model, can a subject negotiate access with the data owner?
CorrectIncorrect -
Question 11 of 14
11. Question
What is the process of ensuring accounts are only created for valid users and assigned appropriate privileges?
CorrectIncorrect -
Question 12 of 14
12. Question
Which policy states that users should be allocated only the permissions necessary to perform their duties?
CorrectIncorrect -
Question 13 of 14
13. Question
A terminated employee’s account was still active a week later and used for malicious access. What vulnerability was exploited?
CorrectIncorrect -
Question 14 of 14
14. Question
What is the primary purpose of implementing LDAP?
CorrectIncorrect