2FA Password Expiry Choices Quiz
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of a Wi-Fi Protected Setup (WPS) attack?

  • To assign unique digital identifiers to endpoint devices
  • To simplify account administration
  • To discover an access point WPS PIN by guessing PIN numbers (correct)
  • To force users to pay for access

Which type of privileges is the BEST choice for simplifying account administration in a high turnover department?

  • Domain-assigned privileges
  • User-assigned privileges
  • Network-assigned privileges
  • Group-based privileges (correct)

What do Mobile Device Management (MDM) applications do with endpoint devices?

  • Assign unique digital identifiers (correct)
  • Force users to acknowledge usage policies
  • Connect to a server hosting the desktop
  • Simplify account administration

What is the main function of a virtual desktop infrastructure (VDI)?

<p>Provide a virtual desktop to users (B)</p> Signup and view all the answers

Which of the following is NOT a valid administration practice according to the text?

<p>User-assigned privileges (A)</p> Signup and view all the answers

What does a WPS attack attempt to guess?

<p>Access point WPS PINs (A)</p> Signup and view all the answers

What is the best method to add a second authentication factor for users launching the gcga application?

<p>Push notifications (A)</p> Signup and view all the answers

Which control can detect malicious traffic after it enters a network?

<p>An intrusion detection system (IDS) (D)</p> Signup and view all the answers

How does an authentication application differ from push notifications in terms of user-friendliness?

<p>An authentication application requires smartphone login and code entry. (A)</p> Signup and view all the answers

What can a Trusted Platform Module (TPM) provide for regarding data security?

<p>Implementing full disk encryption (D)</p> Signup and view all the answers

Which hardware device can generate and store RSA keys used with servers?

<p>Hardware Security Module (HSM) (A)</p> Signup and view all the answers

Why can't an intrusion detection system (IDS) deter attacks according to the text?

<p>Attackers are unaware of the presence of an IDS in a system. (B)</p> Signup and view all the answers

What does remote wipe do to a lost device?

<p>Sends a signal to erase data (B)</p> Signup and view all the answers

Why won't geolocation technologies protect data on a lost device?

<p>They are ineffective in locating lost devices (B)</p> Signup and view all the answers

What does an air gap provide in terms of system isolation?

<p>Physical isolation with a gap of air between systems (A)</p> Signup and view all the answers

What does a screened subnet provide in network security?

<p>Connection to both internal network and Internet (C)</p> Signup and view all the answers

What is the purpose of a Network Access Control (NAC) in a BYOD policy implementation?

<p>Health monitoring for security compliance (A)</p> Signup and view all the answers

What type of detection does a Host-based Intrusion Detection System (HIDS) use for known issues?

<p>Signature-based detection (A)</p> Signup and view all the answers

Which method ensures that 2FA passwords expire after 30 seconds?

<p>TOTP (C)</p> Signup and view all the answers

What is the main advantage of removing all shared accounts?

<p>Simplifies administration (D)</p> Signup and view all the answers

Why shouldn't generic accounts be used?

<p>They provide individual accountability (D)</p> Signup and view all the answers

What is the primary purpose of role-based privileges?

<p>To simplify administration tasks (D)</p> Signup and view all the answers

What does a sandbox primarily provide for testing updates?

<p>Isolated testing environment (A)</p> Signup and view all the answers

What characteristic defines a single sign-on (SSO) solution?

<p>Logging in once for access to multiple resources (D)</p> Signup and view all the answers

Which solution is recommended to protect laptop drives against data theft without user interaction?

<p>DLP (C)</p> Signup and view all the answers

What type of attack attempts to discover the passphrase by targeting the initialization vector?

<p>IV attack (A)</p> Signup and view all the answers

In a VPN setup, which mode encrypts all traffic after the user connects to the VPN?

<p>Full tunnel (C)</p> Signup and view all the answers

What is the main purpose of a split tunnel in a VPN configuration?

<p>Encrypt only traffic for private network (A)</p> Signup and view all the answers

Which type of attack attempts to access information on Bluetooth devices?

<p>Bluesnarfing attack (C)</p> Signup and view all the answers

What is the best solution to implement for protecting against data theft according to the text?

<p>SED (A)</p> Signup and view all the answers

More Like This

Verifikasi Dua Langkah (2FA)
0 questions

Verifikasi Dua Langkah (2FA)

VictoriousPlutonium5120 avatar
VictoriousPlutonium5120
Autenticación de dous factores (2FA)
24 questions
Autenticación de Dobre Factor (2FA)
8 questions
Autentifikacija i sigurnost 2FA
48 questions
Use Quizgecko on...
Browser
Browser