select the appropriate authentication category from the dropdown choices.
Which of the following authentication methods is Sara using?
In order for Sara, a client, to logon to her desktop computer, she must provide her username,
password, and a four digit PIN. Which of the following authentication methods is Sara using?
which of the following authentication types?
The security department has implemented a new laptop encryption product in the environment.
The product requires one user name and password at the time of boot up and also another
password after the operating system has finished loading. This setup is using which of the
following authentication types?
which rates the ability of a system to correctly authenticate an authorized user?
Which of the following is a measure of biometrics performance which rates the ability of a system
to correctly authenticate an authorized user?
which rates the ability of a system to correctly authenticate an authorized user?
Which of the following is a measure of biometrics performance which rates the ability of a system
to correctly authenticate an authorized user?
which of the following?
Use of group accounts should be minimized to ensure which of the following?
which of the following?
Use of group accounts should be minimized to ensure which of the following?
Which of the following should the system administrator implement to accomplish this task?
The system administrator is tasked with changing the administrator password across all 2000
computers in the organization. Which of the following should the system administrator implement
to accomplish this task?
Which of the following is the MOST efficient method for granting the account non-privileged access to the host
A network inventory discovery application requires non-privileged access to all hosts on a network
for inventory of installed applications. A service account is created by the network inventory
discovery application for accessing all hosts. Which of the following is the MOST efficient method
for granting the account non-privileged access to the hosts?
Which of the following BEST explains why Ann is not required to change her password?
A group policy requires users in an organization to use strong passwords that must be changed
every 15 days. Joe and Ann were hired 16 days ago. When Joe logs into the network, he is
prompted to change his password; when Ann logs into the network, she is not prompted to change
her password. Which of the following BEST explains why Ann is not required to change her
password?