11. How do businesses benefit from implementing single sign-on (SSO) technology? Select two answers.

  • By simplifying their user management
  • By providing a better user experience
  • By requiring multiple forms of identification
  • By streamlining HTTP traffic between servers

12. A retail company has one employee that’s in charge of purchasing goods, another employee that's in charge of approving new purchases, and a third employee that’s in charge of paying invoices. What security principle is the retail company implementing?

  • Separation of duties
  • Least privilege
  • Authentication, authorization, and accounting (AAA)
  • Non-repudiation

13. What are the categories of access controls? Select three answers.

  • Authorization
  • Administration
  • Authentication
  • Accounting

14. What credential does OAuth use to authenticate users?

  • A one-time passcode (OTP)
  • A session cookie
  • An application programming interface (API) token
  • A digital certificate

Weekly challenge 2

15. Which of the following examples are categories of security controls? Select three answers.

  • Operational
  • Managerial
  • Technical
  • Compliance

16. A large hotel chain is conducting a national sweepstakes. To enter the sweepstakes, customers must consent to sharing their email address with the chain’s business partners for marketing purposes. What are the hotel chain's responsibilities as data custodians? Select three answers.

  • Back up customer information
  • Send information to business partners
  • Grant business partners consent to use customer data
  • Collect customer consent and emails

17. You send an email to a friend. The service provider of your inbox encrypts all messages that you send. What happens to the information in your email when it’s encrypted?

  • It’s converted from a hash value to ciphertext.
  • It’s converted from Caesar’s cipher to plaintext.
  • It’s converted from plaintext to ciphertext.
  • It’s converted from ciphertext to plaintext.

18. Why are hash algorithms that generate long hash values more secure than those that produce short hash values?

  • They are easier to decrypt
  • They are easier to exchange over a network
  • They are more difficult to remember
  • They are more difficult to brute force

Shuffle Q/A 2

19. Fill in the blank: A _____ is used to prove the identity of users, companies, and networks in public key infrastructure.

  • digital certificate
  • access token
  • access key
  • digital signature

20. Fill in the blank: Knowledge, ownership, and characteristic are three factors of _____ systems.

  • authorization
  • administrative
  • accounting
  • authentication

Leave a Reply