11. How do businesses benefit from implementing single sign-on (SSO) technology? Select two answers.
- By simplifying their user management
- By providing a better user experience
- By requiring multiple forms of identification
- By streamlining HTTP traffic between servers
12. A retail company has one employee that’s in charge of purchasing goods, another employee that's in charge of approving new purchases, and a third employee that’s in charge of paying invoices. What security principle is the retail company implementing?
- Separation of duties
- Least privilege
- Authentication, authorization, and accounting (AAA)
- Non-repudiation
13. What are the categories of access controls? Select three answers.
- Authorization
- Administration
- Authentication
- Accounting
14. What credential does OAuth use to authenticate users?
- A one-time passcode (OTP)
- A session cookie
- An application programming interface (API) token
- A digital certificate
Weekly challenge 2
15. Which of the following examples are categories of security controls? Select three answers.
- Operational
- Managerial
- Technical
- Compliance
16. A large hotel chain is conducting a national sweepstakes. To enter the sweepstakes, customers must consent to sharing their email address with the chain’s business partners for marketing purposes. What are the hotel chain's responsibilities as data custodians? Select three answers.
- Back up customer information
- Send information to business partners
- Grant business partners consent to use customer data
- Collect customer consent and emails
17. You send an email to a friend. The service provider of your inbox encrypts all messages that you send. What happens to the information in your email when it’s encrypted?
- It’s converted from a hash value to ciphertext.
- It’s converted from Caesar’s cipher to plaintext.
- It’s converted from plaintext to ciphertext.
- It’s converted from ciphertext to plaintext.
18. Why are hash algorithms that generate long hash values more secure than those that produce short hash values?
- They are easier to decrypt
- They are easier to exchange over a network
- They are more difficult to remember
- They are more difficult to brute force
Shuffle Q/A 2
19. Fill in the blank: A _____ is used to prove the identity of users, companies, and networks in public key infrastructure.
- digital certificate
- access token
- access key
- digital signature
20. Fill in the blank: Knowledge, ownership, and characteristic are three factors of _____ systems.
- authorization
- administrative
- accounting
- authentication