Podcast
Questions and Answers
Which type of security control is applied and enforced by digital or cyber systems and software?
Which type of security control is applied and enforced by digital or cyber systems and software?
What is the function of authentication in an access control system?
What is the function of authentication in an access control system?
Which of the following is an example of a physical control?
Which of the following is an example of a physical control?
Which group is used when assigning permissions and rights in Windows?
Which group is used when assigning permissions and rights in Windows?
Signup and view all the answers
Which group has the same default permissions and rights as the User group?
Which group has the same default permissions and rights as the User group?
Signup and view all the answers
Which group is present to support legacy applications but has the same permissions as the standard Users group in Windows 10/11?
Which group is present to support legacy applications but has the same permissions as the standard Users group in Windows 10/11?
Signup and view all the answers
Which account is automatically added to the Administrators group during setup?
Which account is automatically added to the Administrators group during setup?
Signup and view all the answers
Which of the following is NOT a way to identify a subject in an Access Control List (ACL)?
Which of the following is NOT a way to identify a subject in an Access Control List (ACL)?
Signup and view all the answers
What is the principle of implicit deny in ACL security?
What is the principle of implicit deny in ACL security?
Signup and view all the answers
What is the principle of least privilege in access control?
What is the principle of least privilege in access control?
Signup and view all the answers
Which of the following is an example of a least privilege security control?
Which of the following is an example of a least privilege security control?
Signup and view all the answers
What is the difference between a local account and a Microsoft account in Windows?
What is the difference between a local account and a Microsoft account in Windows?
Signup and view all the answers
What is the purpose of UAC in Windows?
What is the purpose of UAC in Windows?
Signup and view all the answers
Which account is not subject to UAC?
Which account is not subject to UAC?
Signup and view all the answers
What is the purpose of authentication in an access control system?
What is the purpose of authentication in an access control system?
Signup and view all the answers
Which type of bio gesture authentication uses a sensor to scan the unique features of the user's fingerprint?
Which type of bio gesture authentication uses a sensor to scan the unique features of the user's fingerprint?
Signup and view all the answers
What does SSO stand for?
What does SSO stand for?
Signup and view all the answers
What is the disadvantage of using passwords in SSO systems?
What is the disadvantage of using passwords in SSO systems?
Signup and view all the answers
How does Windows Hello for Business mitigate the risks of using passwords in SSO systems?
How does Windows Hello for Business mitigate the risks of using passwords in SSO systems?
Signup and view all the answers
Which device is typically compliant with Fast Identity Online (FIDO) version 2 standards?
Which device is typically compliant with Fast Identity Online (FIDO) version 2 standards?
Signup and view all the answers
What is the preferred system for network authentication in Windows network sign-in?
What is the preferred system for network authentication in Windows network sign-in?
Signup and view all the answers
Which component compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database?
Which component compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database?
Signup and view all the answers
What is the purpose of a PIN in Windows Hello?
What is the purpose of a PIN in Windows Hello?
Signup and view all the answers
Which of the following is NOT considered as an authentication factor?
Which of the following is NOT considered as an authentication factor?
Signup and view all the answers
Which of the following is an example of multifactor authentication?
Which of the following is an example of multifactor authentication?
Signup and view all the answers
What is a soft token also referred to as?
What is a soft token also referred to as?
Signup and view all the answers
Which of the following is required for an authenticator application to be used for passwordless access?
Which of the following is required for an authenticator application to be used for passwordless access?
Signup and view all the answers