Authentication Factors Quiz
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of authentication factor relies on the user's biometric characteristics, such as a fingerprint, a face, or an iris?

  • Something you know
  • Something you do
  • Something you have
  • Something you are (correct)
  • What is a common example of something you have that can be used to generate a one-time password (OTP) or a code to access a VPN?

  • Fingerprint
  • Password
  • Facial recognition
  • Authentication token (correct)
  • Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

  • Automation (correct)
  • Compliance checklist
  • Manual audit
  • Attestation
  • What is a common example of something you are that can be used to scan and verify the user's identity to access a VPN?

    <p>Thumbprint</p> Signup and view all the answers

    What is the process of using software, hardware, or other tools to perform tasks that would otherwise require human intervention or manual effort?

    <p>Automation</p> Signup and view all the answers

    Which of the following can automation be used for in relation to security settings on servers?

    <p>All of the above</p> Signup and view all the answers

    What type of security technique involves checking user input for malicious or unexpected data before processing by an application?

    <p>Input validation</p> Signup and view all the answers

    Which of the following is not a special character that the organization's security policy aims to remove from user input?

    <h1></h1> Signup and view all the answers

    What technique is used to hide information within another medium, such as an image or audio file?

    <p>Steganography</p> Signup and view all the answers

    If an organization wants to prevent embedded keys from being included in their source code, which security technique should they adopt?

    <p>Static code analysis</p> Signup and view all the answers

    What is the process of converting data into a fixed-size string of characters, which cannot be reversed?

    <p>Hashing</p> Signup and view all the answers

    Which of the following security techniques involves replacing sensitive data with fictitious data?

    <p>Data masking</p> Signup and view all the answers

    What is the primary purpose of audits in a banking environment?

    <p>To ensure compliance with laws, standards, and policies</p> Signup and view all the answers

    In a penetration testing engagement, what type of reconnaissance involves sending packets or requests to a target and analyzing the responses?

    <p>Active</p> Signup and view all the answers

    What is the most common data loss path for an air-gapped network?

    <p>Removable devices</p> Signup and view all the answers

    Which of the following is NOT a purpose of audits in a banking environment?

    <p>Conducting penetration testing</p> Signup and view all the answers

    What type of reconnaissance involves observing network activity without directly interacting with the target?

    <p>Passive</p> Signup and view all the answers

    How can an air-gapped network be compromised despite being physically isolated?

    <p>Via the use of removable devices</p> Signup and view all the answers

    What is the primary technique used by attackers in a Business Email Compromise (BEC) attack?

    <p>Social engineering</p> Signup and view all the answers

    In the given scenario, what is the attacker's goal in requesting gift cards?

    <p>To steal money from the victim</p> Signup and view all the answers

    How does the attacker make the email appear to be from an executive in the given scenario?

    <p>By spoofing or compromising the executive's email address</p> Signup and view all the answers

    What is the purpose of capacity planning in the context of business continuity strategy?

    <p>To determine the resources needed to meet current and future demands</p> Signup and view all the answers

    Which of the following is NOT a common tactic used by BEC attackers?

    <p>Using malware to gain access to email accounts</p> Signup and view all the answers

    In the context of business continuity planning, what does the term 'geographic dispersion' refer to?

    <p>Distributing operations across multiple locations</p> Signup and view all the answers

    What is the primary goal of social engineering?

    <p>To gain unauthorized access to confidential information</p> Signup and view all the answers

    In the given scenario, what technique was the suspicious caller employing?

    <p>Pretexting</p> Signup and view all the answers

    Which of the following is the most appropriate mitigation strategy for suspicious connections between internal endpoints?

    <p>Configuring host-based firewalls on endpoints</p> Signup and view all the answers

    Which practice is most effective in preventing insider threats related to malicious code introduction?

    <p>Implementing peer review and approval processes</p> Signup and view all the answers

    What is the primary purpose of a host-based firewall?

    <p>To filter and monitor network traffic at the endpoint level</p> Signup and view all the answers

    Which of the following is not a common social engineering technique?

    <p>Vulnerability scanning</p> Signup and view all the answers

    More Like This

    Authentication methods in cybersecurity
    3 questions
    Authentication Methods Quiz
    6 questions
    Authentication Methods Quiz
    4 questions
    Use Quizgecko on...
    Browser
    Browser