27 Questions
Which type of security control is applied and enforced by digital or cyber systems and software?
Logical controls
What is the function of authentication in an access control system?
Identifying everything using the system
Which of the following is an example of a physical control?
Fences
Which group is used when assigning permissions and rights in Windows?
Administrators group
Which group has the same default permissions and rights as the User group?
Users group
Which group is present to support legacy applications but has the same permissions as the standard Users group in Windows 10/11?
Power Users group
Which account is automatically added to the Administrators group during setup?
Microsoft user
Which of the following is NOT a way to identify a subject in an Access Control List (ACL)?
Username
What is the principle of implicit deny in ACL security?
Access is denied unless specified otherwise
What is the principle of least privilege in access control?
Granting minimum possible rights to a user
Which of the following is an example of a least privilege security control?
User Account Control (UAC)
What is the difference between a local account and a Microsoft account in Windows?
A local account can be used to log on to any computer
What is the purpose of UAC in Windows?
To protect the system against malicious scripts and attacks
Which account is not subject to UAC?
The default "Administrator" user account
What is the purpose of authentication in an access control system?
To verify the credentials of the account holder
Which type of bio gesture authentication uses a sensor to scan the unique features of the user's fingerprint?
Fingerprint
What does SSO stand for?
Single Sign-On
What is the disadvantage of using passwords in SSO systems?
Compromising the account also compromises multiple services
How does Windows Hello for Business mitigate the risks of using passwords in SSO systems?
By using encryption key pairs
Which device is typically compliant with Fast Identity Online (FIDO) version 2 standards?
Hard token
What is the preferred system for network authentication in Windows network sign-in?
Kerberos
Which component compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database?
Local Security Authority (LSA)
What is the purpose of a PIN in Windows Hello?
To act as a backup mechanism
Which of the following is NOT considered as an authentication factor?
Something you can do
Which of the following is an example of multifactor authentication?
Using a password and a fingerprint
What is a soft token also referred to as?
A one-time password (OTP)
Which of the following is required for an authenticator application to be used for passwordless access?
A screen lock opened via a fingerprint
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free