Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)



1

Which of the following methods is the best form of authentication?
A)Biometrics
B)Multiple factor
C)Password-based
D)Token-based
2

The weakest link in the security chain in a physical security system is the ____.
A)hardware
B)software
C)system administrator
D)user
3

The process in which users prove their identity is called ____.
A)authentication
B)authorization
C)identification
D)recognition
4

Which of the following examples is NOT part of a physical access attack?
A)Imaging of a drive.
B)Penetration through a firewall.
C)Theft of hardware.
D)Usage of an open Ethernet jack.
5

Before the advent of CD-ROMs, the primary boot disk was the ____.
A)DVD-ROM
B)floppy
C)hard drive
D)zip drive
6

The process that makes a bit-by-bit copy of a hard drive onto some other media is called ____.
A)biometrics
B)booting
C)drive imaging
D)remote access
7

A computer mistaking an individual for another due to similar fingerprints is an example of ____.
A)access control
B)drive imaging
C)false negative
D)false positive
8

Which of the following is NOT a means of authentication?
A)Biometrics
B)Drive imaging
C)Password
D)Smart card
9

A biometric system granting access to an unauthorized individual is an example of ____.
A)an access token
B)authentication
C)a false negative
D)a false positive
10

False negatives and false positives should be minimized in a system that uses ____ authentication.
A)biometric
B)password
C)smart card
D)token







Security+ and BeyondOnline Learning Center

Home > Chapter 8 > Multiple Choice Quiz