Quiz

Question 1

Which part of the CIA triad ensures that systems are running and accessible by users?

  1. Confidentiality

  2. Integrity

  3. Authentication

  4. Availability

  5. Authorization

  6. Accounting

chevron-rightSolutionhashtag
  1. Availability

Question 2

Which of the following terms refers to the real possibility that a potential weakness is taken advantage of to attack a system?

  1. Threat

  2. Vulnerability

  3. Exploit

  4. Mitigation technique

chevron-rightSolutionhashtag
  1. Threat

Question 3

Your company implements door locks that require a badge to be scanned and a pass code to be entered. What is this an example of? (select the two best answers)

  1. User training

  2. User awareness

  3. Physical access control

  4. Multi-factor authentication

  5. AAA

  6. Biometrics

chevron-rightSolutionhashtag
  1. Physical access control

  2. Multi-factor authentication

Question 4

Which of the following is NOT an example of a multi-factor authentication?

  1. Swiping a key card and then doing a retina scan.

  2. Entering a password and then tapping a notification on your phone.

  3. Doing a retina scan and then doing a fingerprint scan.

  4. Swiping a key card and then entering a PIN.

chevron-rightSolutionhashtag
  1. Doing a retina scan and then doing a fingerprint scan.

Question 5

Which of the following is considered Accounting in the AAA model?

  1. Granting a user permission to modify a file.

  2. Using MFA to verify a user's identity.

  3. Restricting a user from viewing a file.

  4. Logging the date and time a user is logged in to the system.

chevron-rightSolutionhashtag
  1. Logging the date and time a usre is logged in to the system.

Last updated