Authentication Factors Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What type of authentication factor relies on the user's biometric characteristics, such as a fingerprint, a face, or an iris?

  • Something you know
  • Something you do
  • Something you have
  • Something you are (correct)

What is a common example of something you have that can be used to generate a one-time password (OTP) or a code to access a VPN?

  • Fingerprint
  • Password
  • Facial recognition
  • Authentication token (correct)

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

  • Automation (correct)
  • Compliance checklist
  • Manual audit
  • Attestation

What is a common example of something you are that can be used to scan and verify the user's identity to access a VPN?

<p>Thumbprint (D)</p> Signup and view all the answers

What is the process of using software, hardware, or other tools to perform tasks that would otherwise require human intervention or manual effort?

<p>Automation (A)</p> Signup and view all the answers

Which of the following can automation be used for in relation to security settings on servers?

<p>All of the above (D)</p> Signup and view all the answers

What type of security technique involves checking user input for malicious or unexpected data before processing by an application?

<p>Input validation (B)</p> Signup and view all the answers

Which of the following is not a special character that the organization's security policy aims to remove from user input?

<h1>(D)</h1> Signup and view all the answers

What technique is used to hide information within another medium, such as an image or audio file?

<p>Steganography (A)</p> Signup and view all the answers

If an organization wants to prevent embedded keys from being included in their source code, which security technique should they adopt?

<p>Static code analysis (C)</p> Signup and view all the answers

What is the process of converting data into a fixed-size string of characters, which cannot be reversed?

<p>Hashing (B)</p> Signup and view all the answers

Which of the following security techniques involves replacing sensitive data with fictitious data?

<p>Data masking (D)</p> Signup and view all the answers

What is the primary purpose of audits in a banking environment?

<p>To ensure compliance with laws, standards, and policies (D)</p> Signup and view all the answers

In a penetration testing engagement, what type of reconnaissance involves sending packets or requests to a target and analyzing the responses?

<p>Active (C)</p> Signup and view all the answers

What is the most common data loss path for an air-gapped network?

<p>Removable devices (D)</p> Signup and view all the answers

Which of the following is NOT a purpose of audits in a banking environment?

<p>Conducting penetration testing (C)</p> Signup and view all the answers

What type of reconnaissance involves observing network activity without directly interacting with the target?

<p>Passive (B)</p> Signup and view all the answers

How can an air-gapped network be compromised despite being physically isolated?

<p>Via the use of removable devices (A)</p> Signup and view all the answers

What is the primary technique used by attackers in a Business Email Compromise (BEC) attack?

<p>Social engineering (B)</p> Signup and view all the answers

In the given scenario, what is the attacker's goal in requesting gift cards?

<p>To steal money from the victim (B)</p> Signup and view all the answers

How does the attacker make the email appear to be from an executive in the given scenario?

<p>By spoofing or compromising the executive's email address (B)</p> Signup and view all the answers

What is the purpose of capacity planning in the context of business continuity strategy?

<p>To determine the resources needed to meet current and future demands (B)</p> Signup and view all the answers

Which of the following is NOT a common tactic used by BEC attackers?

<p>Using malware to gain access to email accounts (C)</p> Signup and view all the answers

In the context of business continuity planning, what does the term 'geographic dispersion' refer to?

<p>Distributing operations across multiple locations (B)</p> Signup and view all the answers

What is the primary goal of social engineering?

<p>To gain unauthorized access to confidential information (D)</p> Signup and view all the answers

In the given scenario, what technique was the suspicious caller employing?

<p>Pretexting (C)</p> Signup and view all the answers

Which of the following is the most appropriate mitigation strategy for suspicious connections between internal endpoints?

<p>Configuring host-based firewalls on endpoints (B)</p> Signup and view all the answers

Which practice is most effective in preventing insider threats related to malicious code introduction?

<p>Implementing peer review and approval processes (D)</p> Signup and view all the answers

What is the primary purpose of a host-based firewall?

<p>To filter and monitor network traffic at the endpoint level (C)</p> Signup and view all the answers

Which of the following is not a common social engineering technique?

<p>Vulnerability scanning (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Authentication methods in cybersecurity
3 questions
Authentication Methods Quiz
6 questions
Authentication Methods Quiz
4 questions
Use Quizgecko on...
Browser
Browser