14

.docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

332

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

1

Uploaded by MinisterElementWolverine34

Report
14.4.14 Practice Questions 1. Which of the following does Windows use to manage and enforce what a user is authorized to access? Access control list 2. Which of the following BEST describes authorization? The resources that a user can access. 3. Which of the following processes is used to prove a user's identity? Authentication 4. Which of the following statements is true regarding hard tokens? Hard tokens provide a higher level of security. 5. You have been hired to assess a client's security. During your testing, you discover that users have access to other departments' files. Which of the following should you recommend that the company implement? Principle of least privilege 6. Your company has recently implemented a BYOD policy. To protect the network, users must install an app on their devices that allows the security administrator to enforce the security policies. Which of the following is this an example of? Mobile device management 7. Which of the following authentication combinations is an example of multi-factor authentication? PIN and authentication app 8. Which of the following is an example of a soft token? Authentication app 9. You are working as a junior network technician at the local hospital. The security administrator has just finished rolling out a new security policy that requires users to log in to workstations using a fingerprint scanner. Which authentication category does this fall under? Something you are 10. Which authentication category does a username and password fall under? Something you know
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help