2FA Password Expiry Choices Quiz

PlushRococo avatar
PlushRococo
·
·
Download

Start Quiz

Study Flashcards

30 Questions

What is the purpose of a Wi-Fi Protected Setup (WPS) attack?

To discover an access point WPS PIN by guessing PIN numbers

Which type of privileges is the BEST choice for simplifying account administration in a high turnover department?

Group-based privileges

What do Mobile Device Management (MDM) applications do with endpoint devices?

Assign unique digital identifiers

What is the main function of a virtual desktop infrastructure (VDI)?

Provide a virtual desktop to users

Which of the following is NOT a valid administration practice according to the text?

User-assigned privileges

What does a WPS attack attempt to guess?

Access point WPS PINs

What is the best method to add a second authentication factor for users launching the gcga application?

Push notifications

Which control can detect malicious traffic after it enters a network?

An intrusion detection system (IDS)

How does an authentication application differ from push notifications in terms of user-friendliness?

An authentication application requires smartphone login and code entry.

What can a Trusted Platform Module (TPM) provide for regarding data security?

Implementing full disk encryption

Which hardware device can generate and store RSA keys used with servers?

Hardware Security Module (HSM)

Why can't an intrusion detection system (IDS) deter attacks according to the text?

Attackers are unaware of the presence of an IDS in a system.

What does remote wipe do to a lost device?

Sends a signal to erase data

Why won't geolocation technologies protect data on a lost device?

They are ineffective in locating lost devices

What does an air gap provide in terms of system isolation?

Physical isolation with a gap of air between systems

What does a screened subnet provide in network security?

Connection to both internal network and Internet

What is the purpose of a Network Access Control (NAC) in a BYOD policy implementation?

Health monitoring for security compliance

What type of detection does a Host-based Intrusion Detection System (HIDS) use for known issues?

Signature-based detection

Which method ensures that 2FA passwords expire after 30 seconds?

TOTP

What is the main advantage of removing all shared accounts?

Simplifies administration

Why shouldn't generic accounts be used?

They provide individual accountability

What is the primary purpose of role-based privileges?

To simplify administration tasks

What does a sandbox primarily provide for testing updates?

Isolated testing environment

What characteristic defines a single sign-on (SSO) solution?

Logging in once for access to multiple resources

Which solution is recommended to protect laptop drives against data theft without user interaction?

DLP

What type of attack attempts to discover the passphrase by targeting the initialization vector?

IV attack

In a VPN setup, which mode encrypts all traffic after the user connects to the VPN?

Full tunnel

What is the main purpose of a split tunnel in a VPN configuration?

Encrypt only traffic for private network

Which type of attack attempts to access information on Bluetooth devices?

Bluesnarfing attack

What is the best solution to implement for protecting against data theft according to the text?

SED

Test your knowledge on two-factor authentication (2FA) password expiry options with this quiz. Choose the best option for ensuring that 2FA passwords expire after 30 seconds.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser