Hard Token Authentication Quiz
27 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of security control is applied and enforced by digital or cyber systems and software?

  • Access controls
  • Physical controls
  • Logical controls (correct)
  • Procedural controls

What is the function of authentication in an access control system?

  • Minimizing risks relating to personal or company property
  • Identifying everything using the system (correct)
  • Controlling network communications
  • Allowing access to resources with defined permissions

Which of the following is an example of a physical control?

  • Antivirus software
  • User authentication
  • Firewall
  • Fences (correct)

Which group is used when assigning permissions and rights in Windows?

<p>Administrators group (A)</p> Signup and view all the answers

Which group has the same default permissions and rights as the User group?

<p>Users group (B)</p> Signup and view all the answers

Which group is present to support legacy applications but has the same permissions as the standard Users group in Windows 10/11?

<p>Power Users group (D)</p> Signup and view all the answers

Which account is automatically added to the Administrators group during setup?

<p>Microsoft user (B)</p> Signup and view all the answers

Which of the following is NOT a way to identify a subject in an Access Control List (ACL)?

<p>Username (A)</p> Signup and view all the answers

What is the principle of implicit deny in ACL security?

<p>Access is denied unless specified otherwise (B)</p> Signup and view all the answers

What is the principle of least privilege in access control?

<p>Granting minimum possible rights to a user (A)</p> Signup and view all the answers

Which of the following is an example of a least privilege security control?

<p>User Account Control (UAC) (B)</p> Signup and view all the answers

What is the difference between a local account and a Microsoft account in Windows?

<p>A local account can be used to log on to any computer (D)</p> Signup and view all the answers

What is the purpose of UAC in Windows?

<p>To protect the system against malicious scripts and attacks (D)</p> Signup and view all the answers

Which account is not subject to UAC?

<p>The default &quot;Administrator&quot; user account (B)</p> Signup and view all the answers

What is the purpose of authentication in an access control system?

<p>To verify the credentials of the account holder (C)</p> Signup and view all the answers

Which type of bio gesture authentication uses a sensor to scan the unique features of the user's fingerprint?

<p>Fingerprint (D)</p> Signup and view all the answers

What does SSO stand for?

<p>Single Sign-On (A)</p> Signup and view all the answers

What is the disadvantage of using passwords in SSO systems?

<p>Compromising the account also compromises multiple services (C)</p> Signup and view all the answers

How does Windows Hello for Business mitigate the risks of using passwords in SSO systems?

<p>By using encryption key pairs (A)</p> Signup and view all the answers

Which device is typically compliant with Fast Identity Online (FIDO) version 2 standards?

<p>Hard token (A)</p> Signup and view all the answers

What is the preferred system for network authentication in Windows network sign-in?

<p>Kerberos (A)</p> Signup and view all the answers

Which component compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database?

<p>Local Security Authority (LSA) (B)</p> Signup and view all the answers

What is the purpose of a PIN in Windows Hello?

<p>To act as a backup mechanism (A)</p> Signup and view all the answers

Which of the following is NOT considered as an authentication factor?

<p>Something you can do (A)</p> Signup and view all the answers

Which of the following is an example of multifactor authentication?

<p>Using a password and a fingerprint (C)</p> Signup and view all the answers

What is a soft token also referred to as?

<p>A one-time password (OTP) (B)</p> Signup and view all the answers

Which of the following is required for an authenticator application to be used for passwordless access?

<p>A screen lock opened via a fingerprint (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

DeFi Governance and Tokens Quiz
10 questions
Understanding Hard and Soft 'g' Sounds
9 questions
Hard Times by Charles Dickens Quiz
34 questions
Use Quizgecko on...
Browser
Browser