2FA Password Expiry Choices Quiz
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of a Wi-Fi Protected Setup (WPS) attack?

  • To assign unique digital identifiers to endpoint devices
  • To simplify account administration
  • To discover an access point WPS PIN by guessing PIN numbers (correct)
  • To force users to pay for access
  • Which type of privileges is the BEST choice for simplifying account administration in a high turnover department?

  • Domain-assigned privileges
  • User-assigned privileges
  • Network-assigned privileges
  • Group-based privileges (correct)
  • What do Mobile Device Management (MDM) applications do with endpoint devices?

  • Assign unique digital identifiers (correct)
  • Force users to acknowledge usage policies
  • Connect to a server hosting the desktop
  • Simplify account administration
  • What is the main function of a virtual desktop infrastructure (VDI)?

    <p>Provide a virtual desktop to users</p> Signup and view all the answers

    Which of the following is NOT a valid administration practice according to the text?

    <p>User-assigned privileges</p> Signup and view all the answers

    What does a WPS attack attempt to guess?

    <p>Access point WPS PINs</p> Signup and view all the answers

    What is the best method to add a second authentication factor for users launching the gcga application?

    <p>Push notifications</p> Signup and view all the answers

    Which control can detect malicious traffic after it enters a network?

    <p>An intrusion detection system (IDS)</p> Signup and view all the answers

    How does an authentication application differ from push notifications in terms of user-friendliness?

    <p>An authentication application requires smartphone login and code entry.</p> Signup and view all the answers

    What can a Trusted Platform Module (TPM) provide for regarding data security?

    <p>Implementing full disk encryption</p> Signup and view all the answers

    Which hardware device can generate and store RSA keys used with servers?

    <p>Hardware Security Module (HSM)</p> Signup and view all the answers

    Why can't an intrusion detection system (IDS) deter attacks according to the text?

    <p>Attackers are unaware of the presence of an IDS in a system.</p> Signup and view all the answers

    What does remote wipe do to a lost device?

    <p>Sends a signal to erase data</p> Signup and view all the answers

    Why won't geolocation technologies protect data on a lost device?

    <p>They are ineffective in locating lost devices</p> Signup and view all the answers

    What does an air gap provide in terms of system isolation?

    <p>Physical isolation with a gap of air between systems</p> Signup and view all the answers

    What does a screened subnet provide in network security?

    <p>Connection to both internal network and Internet</p> Signup and view all the answers

    What is the purpose of a Network Access Control (NAC) in a BYOD policy implementation?

    <p>Health monitoring for security compliance</p> Signup and view all the answers

    What type of detection does a Host-based Intrusion Detection System (HIDS) use for known issues?

    <p>Signature-based detection</p> Signup and view all the answers

    Which method ensures that 2FA passwords expire after 30 seconds?

    <p>TOTP</p> Signup and view all the answers

    What is the main advantage of removing all shared accounts?

    <p>Simplifies administration</p> Signup and view all the answers

    Why shouldn't generic accounts be used?

    <p>They provide individual accountability</p> Signup and view all the answers

    What is the primary purpose of role-based privileges?

    <p>To simplify administration tasks</p> Signup and view all the answers

    What does a sandbox primarily provide for testing updates?

    <p>Isolated testing environment</p> Signup and view all the answers

    What characteristic defines a single sign-on (SSO) solution?

    <p>Logging in once for access to multiple resources</p> Signup and view all the answers

    Which solution is recommended to protect laptop drives against data theft without user interaction?

    <p>DLP</p> Signup and view all the answers

    What type of attack attempts to discover the passphrase by targeting the initialization vector?

    <p>IV attack</p> Signup and view all the answers

    In a VPN setup, which mode encrypts all traffic after the user connects to the VPN?

    <p>Full tunnel</p> Signup and view all the answers

    What is the main purpose of a split tunnel in a VPN configuration?

    <p>Encrypt only traffic for private network</p> Signup and view all the answers

    Which type of attack attempts to access information on Bluetooth devices?

    <p>Bluesnarfing attack</p> Signup and view all the answers

    What is the best solution to implement for protecting against data theft according to the text?

    <p>SED</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser