[go: up one dir, main page]

0% found this document useful (0 votes)
31 views4 pages

Quiz - Authentication and Access Control - Attempt Review

The document details the results of a quiz on Authentication and Access Control taken on January 28, 2025, where the participant scored 95 out of 100. It includes a breakdown of questions answered correctly, covering topics such as access control types, protocols for SSO, and authentication methods. The quiz was completed in under three minutes, and the participant received positive feedback for passing.

Uploaded by

apcomputersptp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views4 pages

Quiz - Authentication and Access Control - Attempt Review

The document details the results of a quiz on Authentication and Access Control taken on January 28, 2025, where the participant scored 95 out of 100. It includes a breakdown of questions answered correctly, covering topics such as access control types, protocols for SSO, and authentication methods. The quiz was completed in under three minutes, and the participant received positive feedback for passing.

Uploaded by

apcomputersptp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1/28/25, 7:34 PM Quiz - Authentication and Access Control: Attempt review

 FCF - Technical Introduction to Cybersecurity 1.0 Self-Paced


Started on Tuesday, January 28, 2025, 4:31 PM
State Finished
Completed on Tuesday, January 28, 2025, 4:34 PM
Time taken 2 mins 57 secs
Points 10/10
Grade 95 out of 100
Feedback Congratulations, you passed!

Question 1

Correct

1 points out of 1

What type of access control allows the device or person performing the authentication the ability to allow or deny access?

Select one:
Lattice-based access control
Role-based access control
Discretionary access control
Mandatory access control

Question 2
Correct

1 points out of 1

Which protocol can perform SSO?

Select one:
Kerberos
TCP
CHAP
DNS

https://training.fortinet.com/mod/quiz/review.php?attempt=21049396&cmid=484529 1/4
1/28/25, 7:34 PM Quiz - Authentication and Access Control: Attempt review

Question 3

Correct

1 points out of 1

Which one makes the allow or deny decision in the authentication process?

Select one:
Supplicant
Intermediary
Authentication server
Access point

Question 4

Correct

1 points out of 1

What does a NAC use to identify attached devices and allow access?

Select one:
Device memory size
Username
Device profile
Retinal pattern

Question 5

Correct

1 points out of 1

Which two are the responsibilities of an authentication governing body? (Choose two.)

Select one or more:


Creating disaster recovery policies
Reviewing the password strength policy
User certification
User onboarding

https://training.fortinet.com/mod/quiz/review.php?attempt=21049396&cmid=484529 2/4
1/28/25, 7:34 PM Quiz - Authentication and Access Control: Attempt review

Question 6
Correct

1 points out of 1

Which three can be used as attributes in attribute-based access control? (Choose three.)

Select one or more:


MAC address
Time of day
Hours in a day
DHCP IP address

Question 7

Correct

1 points out of 1

Which two should be selected to create secure multi-factor authentication to access a computer system? (Choose two.)

Select one or more:


Voice identification
Password
Smart Card
Height sensor

Question 8
Correct

1 points out of 1

In SSO authentication, which two entities know the unhashed credentials? (Choose two.)

Select one or more:


Internet service provider
User
Identify provider
Service provider

https://training.fortinet.com/mod/quiz/review.php?attempt=21049396&cmid=484529 3/4
1/28/25, 7:34 PM Quiz - Authentication and Access Control: Attempt review

Question 9
Partially correct

1 points out of 1

Which two are aspects of the principle of least privilege? (Choose two.)

Select one or more:


Reducing error by minimizing access
Allowing only what users and devices need
Allowing access until proven otherwise
Allowing easy, baseline access for all

Question 10
Correct

1 points out of 1

Which is an example of a possession-based authentication method?

Select one:
Texting a one-time code through SMS
Using your eye to pass a biometric lock
Carrying your laptop home
Having your password written down in a secure location

https://training.fortinet.com/mod/quiz/review.php?attempt=21049396&cmid=484529 4/4

You might also like