Hard Token Authentication Quiz
27 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of security control is applied and enforced by digital or cyber systems and software?

  • Access controls
  • Physical controls
  • Logical controls (correct)
  • Procedural controls
  • What is the function of authentication in an access control system?

  • Minimizing risks relating to personal or company property
  • Identifying everything using the system (correct)
  • Controlling network communications
  • Allowing access to resources with defined permissions
  • Which of the following is an example of a physical control?

  • Antivirus software
  • User authentication
  • Firewall
  • Fences (correct)
  • Which group is used when assigning permissions and rights in Windows?

    <p>Administrators group</p> Signup and view all the answers

    Which group has the same default permissions and rights as the User group?

    <p>Users group</p> Signup and view all the answers

    Which group is present to support legacy applications but has the same permissions as the standard Users group in Windows 10/11?

    <p>Power Users group</p> Signup and view all the answers

    Which account is automatically added to the Administrators group during setup?

    <p>Microsoft user</p> Signup and view all the answers

    Which of the following is NOT a way to identify a subject in an Access Control List (ACL)?

    <p>Username</p> Signup and view all the answers

    What is the principle of implicit deny in ACL security?

    <p>Access is denied unless specified otherwise</p> Signup and view all the answers

    What is the principle of least privilege in access control?

    <p>Granting minimum possible rights to a user</p> Signup and view all the answers

    Which of the following is an example of a least privilege security control?

    <p>User Account Control (UAC)</p> Signup and view all the answers

    What is the difference between a local account and a Microsoft account in Windows?

    <p>A local account can be used to log on to any computer</p> Signup and view all the answers

    What is the purpose of UAC in Windows?

    <p>To protect the system against malicious scripts and attacks</p> Signup and view all the answers

    Which account is not subject to UAC?

    <p>The default &quot;Administrator&quot; user account</p> Signup and view all the answers

    What is the purpose of authentication in an access control system?

    <p>To verify the credentials of the account holder</p> Signup and view all the answers

    Which type of bio gesture authentication uses a sensor to scan the unique features of the user's fingerprint?

    <p>Fingerprint</p> Signup and view all the answers

    What does SSO stand for?

    <p>Single Sign-On</p> Signup and view all the answers

    What is the disadvantage of using passwords in SSO systems?

    <p>Compromising the account also compromises multiple services</p> Signup and view all the answers

    How does Windows Hello for Business mitigate the risks of using passwords in SSO systems?

    <p>By using encryption key pairs</p> Signup and view all the answers

    Which device is typically compliant with Fast Identity Online (FIDO) version 2 standards?

    <p>Hard token</p> Signup and view all the answers

    What is the preferred system for network authentication in Windows network sign-in?

    <p>Kerberos</p> Signup and view all the answers

    Which component compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database?

    <p>Local Security Authority (LSA)</p> Signup and view all the answers

    What is the purpose of a PIN in Windows Hello?

    <p>To act as a backup mechanism</p> Signup and view all the answers

    Which of the following is NOT considered as an authentication factor?

    <p>Something you can do</p> Signup and view all the answers

    Which of the following is an example of multifactor authentication?

    <p>Using a password and a fingerprint</p> Signup and view all the answers

    What is a soft token also referred to as?

    <p>A one-time password (OTP)</p> Signup and view all the answers

    Which of the following is required for an authenticator application to be used for passwordless access?

    <p>A screen lock opened via a fingerprint</p> Signup and view all the answers

    More Like This

    DeFi Governance and Tokens Quiz
    10 questions
    Understanding Hard and Soft 'g' Sounds
    9 questions
    Hard Bible Trivia Flashcards
    49 questions
    Use Quizgecko on...
    Browser
    Browser