Quiz

Question 1

Which part of the CIA triad ensures that systems are running and accessible by users?

  1. Confidentiality

  2. Integrity

  3. Authentication

  4. Availability

  5. Authorization

  6. Accounting

Solution
  1. Availability

Question 2

Which of the following terms refers to the real possibility that a potential weakness is taken advantage of to attack a system?

  1. Threat

  2. Vulnerability

  3. Exploit

  4. Mitigation technique

Solution
  1. Threat

Question 3

Your company implements door locks that require a badge to be scanned and a pass code to be entered. What is this an example of? (select the two best answers)

  1. User training

  2. User awareness

  3. Physical access control

  4. Multi-factor authentication

  5. AAA

  6. Biometrics

Solution
  1. Physical access control

  1. Multi-factor authentication

Question 4

Which of the following is NOT an example of a multi-factor authentication?

  1. Swiping a key card and then doing a retina scan.

  2. Entering a password and then tapping a notification on your phone.

  3. Doing a retina scan and then doing a fingerprint scan.

  4. Swiping a key card and then entering a PIN.

Solution
  1. Doing a retina scan and then doing a fingerprint scan.

Question 5

Which of the following is considered Accounting in the AAA model?

  1. Granting a user permission to modify a file.

  2. Using MFA to verify a user's identity.

  3. Restricting a user from viewing a file.

  4. Logging the date and time a user is logged in to the system.

Solution
  1. Logging the date and time a usre is logged in to the system.

Last updated