Fill This Form To Receive Instant Help
Homework answers / question archive / Knowledge Assessment Lesson 14 Multiple Choice Select the correct answer for each of the following questions
Knowledge Assessment Lesson 14
Multiple Choice
Select the correct answer for each of the following questions.
1) Which of the following terms best describes the manner in which security principals prove their identity?
a. Authorization
b. Confidentiality
c. Authentication
d. Integrity
2. Which of the following are considered authentication factors? (Choose all that apply.)
a. Wi-Fi Protected Access
b. Biometrics
c. Picture passwords
d. Smart cards
3. Which of the following gestures are supported by picture passwords? (Choose all that apply.)
a. Straight lines
b. Circles
c. Taps
d. Angles
4. Which of the following authentication protocols is based on a challenge/response mechanism?
a. NTLM
b. Kerberos
c. TLS/SLS
d. File Replication Service
5. Which of the following characteristics describe the characteristics of a workgroup? (Choose all that apply.)
a. All computers are located on same network segment.
b. It has centralized management of user accounts.
c. It is scalable.
d. It uses the SAM database.
6. Which of the following authentication protocols is used in Windows Active Directory domains?
a. Kerberos
b. TGT
c. KDC
d. TLS/SSL
7. Which of the following components is used to create virtual smart cards?
a. SSL certificate
b. Smart card reader
c. Trusted Platform Module
d. Picture authentication
8. Which of the following certificate types is used with virtual smart cards?
a. Smart card logon
b. Basic EFS
c. Workstation authentication
d. User
9. Which of the following tools is used to remember user names and passwords when accessing a website?
a. Local security policy
b. HomeGroup control panel
c. Access token generator
d. Credential Manager
10. Which of the following mechanisms is used to secure HomeGroups?
a. A pin
b. A password
c. A digital certificate
d. Windows Hello
Best Answer
Choose the letter that corresponds to the best answer. More than one answer choice may achieve the goal. Select the BEST answer.
1. Suppose there are 10 computers on a network that are configured to share a few printers and a single document folder. The company is not expected to add more computers or users over the next year. There is also no IT staff to support the network. Which of the following models is the best fit for this network?
a. Domain model
b. Workgroup model
c. Ad hoc model
d. Infrastructure model
2. Which of the following authentication factors offers the most security?
a. Passwords
b. Picture passwords
c. Smart cards
d. Smart cards with a PIN
3. Which of the following authentication types is the least secure?
a. Passwords (20 characters, mixed with upper- and lowercase letters, numbers, and symbols)
b. Smart cards
c. Smart cards with a PIN
d. VSCs
4. Which of the following authentication protocols is best designed to support today’s Active Directory–based networks?
a. NTLMv2
b. NTLMv1
c. Kerberosv1
d. Kerberosv5
5. Which of the following is used to verify the trustworthiness of a computer within a domain? (Choose two answers.)
a. Computer SID
b. Computer certificate
c. User password
d. Computer password
Matching and Identification
1. Match the following terms with the related description or usage.
______ a) Authentication
_______ b) SAM
_______ c) Two-factor authentication
______ d) Device Registration
_______ e) Authorization
_______ f) Workgroup
_______ g) Domain
_______ h) TGT
_______ i) Digital certificate
j) Virtual secure mode
2. Contains user accounts and their associated passwords in a workgroup model
3. Determines what a security principal can do after being authenticated
4. Requires the use of two of the three authentication factors
5. Provides centralized account management
6. Is a collection of computers that interact with each other without any centralized authority
7. Contains information about the user’s computer, a list of SIDs for the user account, and any group account memberships
8. Represents the way that security principals prove their identity
9. Allows users to join their devices to the organization’s network without joining the device to the Active Directory domain
10. Authentication that is based on what you have
11. Used by Device Guard and Credential Guard
Build a List
1. Specify the correct order of steps necessary to using Kerberos for authentication.
_____ An authentication package is created and sent to the KDC.
_____ The user attempts to access a resource and needs a session ticket.
____ The KDC validates the authentication package and sends the user a session ticket.
_____ The KDC validates the authentication package and sends the user a TGT.
_____ The client creates an authentication package (to get a session ticket) and sends it to the KDC along with a request for the resource.
_____ A session ticket is used to authenticate to the file server that contains the resource the user wants.
_____ The file server compares the ticket with a DACL.
2. Specify the correct order of steps necessary to creating a picture password.
_____ Choose Picture.
_____ Click Create a picture password.
_____ Draw three gestures.
_____ Confirm the gestures.
_____ Log on using the picture password.
Business Case Scenarios Solutions
Scenario 14-1: Allowing Personal Smartphones on the Corporate Network
You are an administrator for your company’s Active Directory domain. Your manager has decided to allow users to use their own smartphones and tablets to access email and work documents. Explain what must be configured for users to use their own personal devices?
Scenario 14-2: Securing Your Computers
You are an administrator for the Contoso Corporation, which has about 1,200 computers, mostly running Windows 10. Over the past year, you have managed several instances of malware appearing on the computers of key personnel, leading to a compromise of some key systems. You want to ensure that this does not happen again. Explain how to make sure that users’ credentials and other key parts of Windows are not compromised by rootkits or other forms of malware.
Already member? Sign In