placeholder image to represent content

Authentication

Quiz by Rachel Hirsch

Feel free to use or edit a copy

includes Teacher and Student dashboards

Measure skills
from any curriculum

Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.

With a free account, teachers can
  • edit the questions
  • save a copy for later
  • start a class game
  • automatically assign follow-up activities based on students’ scores
  • assign as homework
  • share a link with colleagues
  • print as a bubble sheet

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
11 questions
Show answers
  • Q1
    You manage a network that uses switches. In the lobby of your building, there are three Rj45 ports connected to a switch. You want to make sure that visitors cannot plug their computers into the free network jacks and connect to the network. But employees who plug into those same jacks should be able to connect to the network. What feature should you configure?
    VLANs
    mirroring
    port authentication using 802.1x
    spanning tree
    300s
  • Q2
    Which of the following is a platform independent authentication system that maintains a database of user accounts and passwords that centralizes the maintenance of those accounts?
    RADIUS
    EAP
    RRAS
    NAS
    300s
  • Q3
    You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?
    run a third-party tool to generate the certificate
    obtain a certificate from a public PKI
    have the server generate its own certificate
    create your own internal PKI to issue certificates
    300s
  • Q4
    When using Kerberos authentication, which of the following terms is used to describe the token that verifies the user's identity to the target system?
    coupon
    voucher
    hashkey
    Ticket
    300s
  • Q5
    You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client?
    MS-CHAP
    CHAP
    PPP
    EAP
    300s
  • Q6
    Which of the following authentication method uses tickets to provide single sign-on?
    802.1x
    Kerberos
    PKI
    MS-CHAP
    300s
  • Q7
    Which of the following applications typically use 802.1x authentication?
    controlling access through a switch or wireless access point
    controlling access through a firewall
    controlling access through an acl
    controlling access through a router or switch
    300s
  • Q8
    Which of the following is the most common form of authentication?
    Photo ID
    Digital certificate on a smart card
    fingerprint
    password
    300s
  • Q9
    Which of the following is the strongest form of multi-factor authentication?
    a password and a biometric scan
    a password, a biometric scan, and a token device
    two-factor authentication
    two passwords
    300s
  • Q10
    Which of the following is an example of something you do?
    smart card
    fingerprint scan
    handwriting
    password
    300s
  • Q11
    Which of the following systems encrypts the entire payload of communications?
    Kerberos
    EAP
    TACACS+
    RADIUS
    300s

Teachers give this quiz to your class