Hard Token Authentication Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which type of security control is applied and enforced by digital or cyber systems and software?

  • Access controls
  • Physical controls
  • Logical controls (correct)
  • Procedural controls

What is the function of authentication in an access control system?

  • Minimizing risks relating to personal or company property
  • Identifying everything using the system (correct)
  • Controlling network communications
  • Allowing access to resources with defined permissions

Which of the following is an example of a physical control?

  • Antivirus software
  • User authentication
  • Firewall
  • Fences (correct)

Which group is used when assigning permissions and rights in Windows?

<p>Administrators group (A)</p> Signup and view all the answers

Which group has the same default permissions and rights as the User group?

<p>Users group (B)</p> Signup and view all the answers

Which group is present to support legacy applications but has the same permissions as the standard Users group in Windows 10/11?

<p>Power Users group (D)</p> Signup and view all the answers

Which account is automatically added to the Administrators group during setup?

<p>Microsoft user (B)</p> Signup and view all the answers

Which of the following is NOT a way to identify a subject in an Access Control List (ACL)?

<p>Username (A)</p> Signup and view all the answers

What is the principle of implicit deny in ACL security?

<p>Access is denied unless specified otherwise (B)</p> Signup and view all the answers

What is the principle of least privilege in access control?

<p>Granting minimum possible rights to a user (A)</p> Signup and view all the answers

Which of the following is an example of a least privilege security control?

<p>User Account Control (UAC) (B)</p> Signup and view all the answers

What is the difference between a local account and a Microsoft account in Windows?

<p>A local account can be used to log on to any computer (D)</p> Signup and view all the answers

What is the purpose of UAC in Windows?

<p>To protect the system against malicious scripts and attacks (D)</p> Signup and view all the answers

Which account is not subject to UAC?

<p>The default &quot;Administrator&quot; user account (B)</p> Signup and view all the answers

What is the purpose of authentication in an access control system?

<p>To verify the credentials of the account holder (C)</p> Signup and view all the answers

Which type of bio gesture authentication uses a sensor to scan the unique features of the user's fingerprint?

<p>Fingerprint (D)</p> Signup and view all the answers

What does SSO stand for?

<p>Single Sign-On (A)</p> Signup and view all the answers

What is the disadvantage of using passwords in SSO systems?

<p>Compromising the account also compromises multiple services (C)</p> Signup and view all the answers

How does Windows Hello for Business mitigate the risks of using passwords in SSO systems?

<p>By using encryption key pairs (A)</p> Signup and view all the answers

Which device is typically compliant with Fast Identity Online (FIDO) version 2 standards?

<p>Hard token (A)</p> Signup and view all the answers

What is the preferred system for network authentication in Windows network sign-in?

<p>Kerberos (A)</p> Signup and view all the answers

Which component compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database?

<p>Local Security Authority (LSA) (B)</p> Signup and view all the answers

What is the purpose of a PIN in Windows Hello?

<p>To act as a backup mechanism (A)</p> Signup and view all the answers

Which of the following is NOT considered as an authentication factor?

<p>Something you can do (A)</p> Signup and view all the answers

Which of the following is an example of multifactor authentication?

<p>Using a password and a fingerprint (C)</p> Signup and view all the answers

What is a soft token also referred to as?

<p>A one-time password (OTP) (B)</p> Signup and view all the answers

Which of the following is required for an authenticator application to be used for passwordless access?

<p>A screen lock opened via a fingerprint (C)</p> Signup and view all the answers

More Like This

Understanding Hard and Soft 'g' Sounds
9 questions
Hard Times by Charles Dickens Quiz
34 questions
Hard Bible Trivia Flashcards
49 questions
Use Quizgecko on...
Browser
Browser