Podcast
Questions and Answers
Which type of security control is applied and enforced by digital or cyber systems and software?
Which type of security control is applied and enforced by digital or cyber systems and software?
- Access controls
- Physical controls
- Logical controls (correct)
- Procedural controls
What is the function of authentication in an access control system?
What is the function of authentication in an access control system?
- Minimizing risks relating to personal or company property
- Identifying everything using the system (correct)
- Controlling network communications
- Allowing access to resources with defined permissions
Which of the following is an example of a physical control?
Which of the following is an example of a physical control?
- Antivirus software
- User authentication
- Firewall
- Fences (correct)
Which group is used when assigning permissions and rights in Windows?
Which group is used when assigning permissions and rights in Windows?
Which group has the same default permissions and rights as the User group?
Which group has the same default permissions and rights as the User group?
Which group is present to support legacy applications but has the same permissions as the standard Users group in Windows 10/11?
Which group is present to support legacy applications but has the same permissions as the standard Users group in Windows 10/11?
Which account is automatically added to the Administrators group during setup?
Which account is automatically added to the Administrators group during setup?
Which of the following is NOT a way to identify a subject in an Access Control List (ACL)?
Which of the following is NOT a way to identify a subject in an Access Control List (ACL)?
What is the principle of implicit deny in ACL security?
What is the principle of implicit deny in ACL security?
What is the principle of least privilege in access control?
What is the principle of least privilege in access control?
Which of the following is an example of a least privilege security control?
Which of the following is an example of a least privilege security control?
What is the difference between a local account and a Microsoft account in Windows?
What is the difference between a local account and a Microsoft account in Windows?
What is the purpose of UAC in Windows?
What is the purpose of UAC in Windows?
Which account is not subject to UAC?
Which account is not subject to UAC?
What is the purpose of authentication in an access control system?
What is the purpose of authentication in an access control system?
Which type of bio gesture authentication uses a sensor to scan the unique features of the user's fingerprint?
Which type of bio gesture authentication uses a sensor to scan the unique features of the user's fingerprint?
What does SSO stand for?
What does SSO stand for?
What is the disadvantage of using passwords in SSO systems?
What is the disadvantage of using passwords in SSO systems?
How does Windows Hello for Business mitigate the risks of using passwords in SSO systems?
How does Windows Hello for Business mitigate the risks of using passwords in SSO systems?
Which device is typically compliant with Fast Identity Online (FIDO) version 2 standards?
Which device is typically compliant with Fast Identity Online (FIDO) version 2 standards?
What is the preferred system for network authentication in Windows network sign-in?
What is the preferred system for network authentication in Windows network sign-in?
Which component compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database?
Which component compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database?
What is the purpose of a PIN in Windows Hello?
What is the purpose of a PIN in Windows Hello?
Which of the following is NOT considered as an authentication factor?
Which of the following is NOT considered as an authentication factor?
Which of the following is an example of multifactor authentication?
Which of the following is an example of multifactor authentication?
What is a soft token also referred to as?
What is a soft token also referred to as?
Which of the following is required for an authenticator application to be used for passwordless access?
Which of the following is required for an authenticator application to be used for passwordless access?
Flashcards are hidden until you start studying