Download PASSEMALL Prep app now
Scan QR code or get instant email to install app
Question:
"Something a user knows," is known as a password but it is not something the user owns.
Comments
Your email address will not be published. Required fields are marked *
Comment *
Name*
Email*
URL
Save my name, email, and website in this browser for the next time I comment.
What form of security threat is he facing in the following situation?You've just gotten a phone call from a customer who is preparing to fill out the information on the Internet demanding personal account numbers and bank information. He claims he received an email from his bank warning him that his credit card information might have been stolen as a result of a security breach revealed by a large hotel chain. He was directed to an official-looking website that requested bank information and account numbers.
phishing
Suppose the user is an impostor, what form of fraudulent activity is she using to obtain access to the system while working on the help desk, you receive a phone call from a user who frantically tells you she can’t log in to her account as she has forgotten her password?
social engineering
"WEP is a strong security protocol that should be used to secure wireless networks" is true or false
False
To apply for default user account permissions, what Active Directory feature can be used?
Group Policy
What is this known as when Jamie enters the corporate headquarters of his firm, he must pass through a tiny space with two closed doors; after entering through the first door, it will lock behind Jamie, and he will need to produce identification to access via the second door?
a mantrap
To establish a VPN across the Internet which technologies can be used?
PPTP
What is an administrator going to do if she needs more security than is provided by a login and password on her mobile devices and wants to add an additional layer of security?
by adding multi-factor authentication
Margaret unlocks her iPhone using only her fingerprint. What type of authentication is this?
biometric authentication
Which option will provide the highest levels of security while configuring a WAP you are prompted to choose between WPA2-AES and WPA2-TKIP if you are a network engineer tasked with configuring a new WLAN for your employer?
AES
Which kind of authentication in the case that Margaret unlocks her iPhone using only her fingerprint?
What can Jenny look for on the site to ensure that it’s a trusted website that Jenny is nervous that a website she is accessing is not a trusted website?
a digital certificate
Which of these is a type of social engineering in which an unauthorized individual gets entrance to a controlled location by following someone who has legitimate access?
tailgating
What steps should you take to protect these settings in the situation that you are a system administrator for a high school and responsible for five student computer labs and you need to prevent students from accessing the system BIOS on the machines?
Assign a password to the system BIOS.
Comments