Which of the following authentication methods is Sara using?
In order for Sara, a client, to logon to her desktop computer, she must provide her username, password,
and a four digit PIN. Which of the following authentication methods is Sara using?
select the appropriate authentication category from the dropdown choices.
which of the following authentication types?
The security department has implemented a new laptop encryption product in the environment. The
product requires one user name and password at the time of boot up and also another password after
the operating system has finished loading. This setup is using which of the following authentication types?
which rates the ability of a system to correctly authenticate an authorized user?
Which of the following is a measure of biometrics performance which rates the ability of a system to
correctly authenticate an authorized user?
which of the following?
Use of group accounts should be minimized to ensure which of the following?
Which of the following should the system administrator implement to accomplish this task?
The system administrator is tasked with changing the administrator password across all 2000 computers
in the organization. Which of the following should the system administrator implement to accomplish this
task?
Which of the following is the MOST efficient method for granting the account non-privileged access to the host
A network inventory discovery application requires non-privileged access to all hosts on a network for
inventory of installed applications. A service account is created by the network inventory discovery
application for accessing all hosts. Which of the following is the MOST efficient method for granting the
account non-privileged access to the hosts?
Which of the following BEST explains why Ann is not required to change her password?
A group policy requires users in an organization to use strong passwords that must be changed every 15
days. Joe and Ann were hired 16 days ago. When Joe logs into the network, he is prompted to change his
password; when Ann logs into the network, she is not prompted to change her password. Which of the
following BEST explains why Ann is not required to change her password?
Which of the following will MOST increase the security of the passwords?
An auditing team has found that passwords do not meet best business practices. Which of the following
will MOST increase the security of the passwords? (Select TWO).
Which of the following passwords is the LEAST complex?
Which of the following passwords is the LEAST complex?