DispersedNet
SiteMap
Network Admin
Unix Admin
System Admin
Network Security
Security Structure
«Prev
Next»
Network Security Overview
Security Standards
Security Characteristics
Security System Threat
Effective Security Systems
Planning Security Policy
System Security Policy
Creating Policy
Organizational Training
Security Standards
Security Basics - Quiz
Effective Security Structure
Important Security Elements
Security Services Standards
Encrypting Decrypting Data
Authentication Methods - Quiz
Securing Protocol Layers
TCP/IP Network
Transport Layer
SYN Flood Attack
Packet Construction
Protocol Layers - Quiz
Securing Resources
OS Security
Protecting TCP/IP
OS Security Quiz
Securing Resources Services
Firewalls in Depth
What is Firewall
Packet Filters
Circuit Level Gateways
Application Gateway
Bastion Host Firewall
Common Firewall Designs
Strategies Goals
Firewall Types
Physical Authentication Methods - Quiz
Authentication methods used in Security
Each question is worth one point. Select the best answer or answers for each question.
1.
The process based on some physical, genetic, or otherwise human characteristic that cannot be duplicated is also known as
Please select the best answer.
A.
Biometric authentication
B.
Physical authentication
C.
Password authentication
D.
Fingerprint authentication
2.
In the computer industry, the "what you have" method is best exemplified by the use of
Please select all the correct answers.
A.
Retinal eye scans
B.
Smart cards
C.
Digital certificates
D.
Passwords
3.
If you give your password to someone else, the computer will grant this other person access because
Please select all the correct answers.
A.
The computer system is not secure
B.
What you know is no longer secret
C.
The authentication is based on knowing the password
D.
Authentication has not been achieved
4.
The method by which a user’s standard password is changed by adding the time the connection is made between its server and a user, and then sent for authentication, is called
Please select the best answer.
A.
Password authentication
B.
“What you know” authentication
C.
Password hijacking
D.
One-time password