Quiz
Question 1
Which part of the CIA triad ensures that systems are running and accessible by users?
Confidentiality
Integrity
Authentication
Availability
Authorization
Accounting
Question 2
Which of the following terms refers to the real possibility that a potential weakness is taken advantage of to attack a system?
Threat
Vulnerability
Exploit
Mitigation technique
Question 3
Your company implements door locks that require a badge to be scanned and a pass code to be entered. What is this an example of? (select the two best answers)
User training
User awareness
Physical access control
Multi-factor authentication
AAA
Biometrics
Question 4
Which of the following is NOT an example of a multi-factor authentication?
Swiping a key card and then doing a retina scan.
Entering a password and then tapping a notification on your phone.
Doing a retina scan and then doing a fingerprint scan.
Swiping a key card and then entering a PIN.
Question 5
Which of the following is considered Accounting in the AAA model?
Granting a user permission to modify a file.
Using MFA to verify a user's identity.
Restricting a user from viewing a file.
Logging the date and time a user is logged in to the system.
Last updated