Authentication Factors for Disabled Users
11 Questions
1 Views

Authentication Factors for Disabled Users

Created by
@LucrativeMagenta

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the difference between a vulnerability and a threat?

  • D. A vulnerability is the actual exploitation of a weakness, while a threat is the potential for a weakness to be exploited
  • B. A vulnerability is the potential for a weakness to be exploited, while a threat is the actual exploitation of a vulnerability
  • C. A vulnerability is a weakness that can be exploited, while a threat is a weakness that can potentially be exploited
  • A. A vulnerability is a weakness that can be exploited, while a threat is the potential for a vulnerability to be exploited (correct)
  • If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?

  • C. Threat (correct)
  • D. Mitigation
  • B. Exploit
  • A. Vulnerability
  • What is the difference between verification and authentication of an identity?

  • B. Verification confirms the validity of the credentials provided, while authentication confirms the identity of a person (correct)
  • A. Verification confirms the identity of a person, while authentication confirms the validity of the credentials provided
  • C. Verification and authentication are interchangeable terms
  • D. Verification and authentication are not related to identity
  • What do you call the process in which the client authenticates to the server and the server authenticates to the client?

    <p>A. Mutual authentication</p> Signup and view all the answers

    A key would be described as which type of authentication factor?

    <p>B. Possession factor</p> Signup and view all the answers

    If you're using an identity card as the basis for your authentication scheme, what steps might you add to the process to allow you to move to multifactor authentication?

    <p>B. Implement biometric factors like fingerprint or iris scan in addition to the identity card</p> Signup and view all the answers

    Name three reasons why an identity card alone might not make an ideal method of authentication.

    <p>D. All of the above</p> Signup and view all the answers

    Based on the Parkerian hexad, what principles are affected if you lose a shipment of encrypted backup tapes that contain personal and payment information for your customers?

    <p>A. Confidentiality and integrity</p> Signup and view all the answers

    If the web servers in your environment are based on Microsoft's Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have?

    <p>A. Vulnerability</p> Signup and view all the answers

    A key would be described as which type of authentication factor?

    <p>B. Possession factor</p> Signup and view all the answers

    Which authentication factors might you want to avoid in an environment with a larger number of disabled or injured users, such as a hospital?

    <p>C. Knowledge factors like passwords or PINs</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser