Authentication Factors Quiz
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of authentication factor relies on the user's biometric characteristics, such as a fingerprint, a face, or an iris?

  • Something you know
  • Something you do
  • Something you have
  • Something you are (correct)

What is a common example of something you have that can be used to generate a one-time password (OTP) or a code to access a VPN?

  • Fingerprint
  • Password
  • Facial recognition
  • Authentication token (correct)

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

  • Automation (correct)
  • Compliance checklist
  • Manual audit
  • Attestation

What is a common example of something you are that can be used to scan and verify the user's identity to access a VPN?

<p>Thumbprint (D)</p> Signup and view all the answers

What is the process of using software, hardware, or other tools to perform tasks that would otherwise require human intervention or manual effort?

<p>Automation (A)</p> Signup and view all the answers

Which of the following can automation be used for in relation to security settings on servers?

<p>All of the above (D)</p> Signup and view all the answers

What type of security technique involves checking user input for malicious or unexpected data before processing by an application?

<p>Input validation (B)</p> Signup and view all the answers

Which of the following is not a special character that the organization's security policy aims to remove from user input?

<h1>(D)</h1> Signup and view all the answers

What technique is used to hide information within another medium, such as an image or audio file?

<p>Steganography (A)</p> Signup and view all the answers

If an organization wants to prevent embedded keys from being included in their source code, which security technique should they adopt?

<p>Static code analysis (C)</p> Signup and view all the answers

What is the process of converting data into a fixed-size string of characters, which cannot be reversed?

<p>Hashing (B)</p> Signup and view all the answers

Which of the following security techniques involves replacing sensitive data with fictitious data?

<p>Data masking (D)</p> Signup and view all the answers

What is the primary purpose of audits in a banking environment?

<p>To ensure compliance with laws, standards, and policies (D)</p> Signup and view all the answers

In a penetration testing engagement, what type of reconnaissance involves sending packets or requests to a target and analyzing the responses?

<p>Active (C)</p> Signup and view all the answers

What is the most common data loss path for an air-gapped network?

<p>Removable devices (D)</p> Signup and view all the answers

Which of the following is NOT a purpose of audits in a banking environment?

<p>Conducting penetration testing (C)</p> Signup and view all the answers

What type of reconnaissance involves observing network activity without directly interacting with the target?

<p>Passive (B)</p> Signup and view all the answers

How can an air-gapped network be compromised despite being physically isolated?

<p>Via the use of removable devices (A)</p> Signup and view all the answers

What is the primary technique used by attackers in a Business Email Compromise (BEC) attack?

<p>Social engineering (B)</p> Signup and view all the answers

In the given scenario, what is the attacker's goal in requesting gift cards?

<p>To steal money from the victim (B)</p> Signup and view all the answers

How does the attacker make the email appear to be from an executive in the given scenario?

<p>By spoofing or compromising the executive's email address (B)</p> Signup and view all the answers

What is the purpose of capacity planning in the context of business continuity strategy?

<p>To determine the resources needed to meet current and future demands (B)</p> Signup and view all the answers

Which of the following is NOT a common tactic used by BEC attackers?

<p>Using malware to gain access to email accounts (C)</p> Signup and view all the answers

In the context of business continuity planning, what does the term 'geographic dispersion' refer to?

<p>Distributing operations across multiple locations (B)</p> Signup and view all the answers

What is the primary goal of social engineering?

<p>To gain unauthorized access to confidential information (D)</p> Signup and view all the answers

In the given scenario, what technique was the suspicious caller employing?

<p>Pretexting (C)</p> Signup and view all the answers

Which of the following is the most appropriate mitigation strategy for suspicious connections between internal endpoints?

<p>Configuring host-based firewalls on endpoints (B)</p> Signup and view all the answers

Which practice is most effective in preventing insider threats related to malicious code introduction?

<p>Implementing peer review and approval processes (D)</p> Signup and view all the answers

What is the primary purpose of a host-based firewall?

<p>To filter and monitor network traffic at the endpoint level (C)</p> Signup and view all the answers

Which of the following is not a common social engineering technique?

<p>Vulnerability scanning (B)</p> Signup and view all the answers

More Like This

Authentication methods in cybersecurity
3 questions
Authentication Methods Quiz
4 questions
Use Quizgecko on...
Browser
Browser