All Coursera Quiz Answers

Test your knowledge: Authentication, authorization, and accounting Quiz Answer

In this article i am gone to share Coursera Course: Assets, Threats, and Vulnerabilities Week 2 Practice quiz | Test your knowledge: Authentication, authorization, and accounting Quiz Answer with you..

Enroll Link: Assets, Threats, and Vulnerabilities

This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course.

In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you’ll build an understanding of how assets are classified. Next, you will become familiar with common threats and vulnerabilities, and the security controls used by organizations to protect valuable information and mitigate risk. You will develop an attacker mindset by practicing the threat modeling process, and you’ll learn tactics for staying ahead of security breaches.


Also visit:  Test your knowledge: Encryption methods Quiz Answers


 

Test your knowledge: Authentication, authorization, and accounting Quiz Answer

Question 1)
What factors do authentication systems use to verify a user’s identity? Select three answers.

  • Authorization
  • Knowledge
  • Ownership
  • Characteristic

Question 2)
How do businesses benefit from implementing single sign-on (SSO) technology? Select two answers.

  • By streamlining HTTP traffic between servers
  • By simplifying their user management
  • By providing a better user experience
  • By requiring multiple forms of identification

Question 3)
A retail company has one employee that’s in charge of purchasing goods, another employee that’s in charge of approving new purchases, and a third employee that’s in charge of paying invoices. What security principle is the retail company implementing?

  • Separation of duties
  • Least privilege
  • Non-repudiation
  • Authentication, authorization, and accounting (AAA)

Question 4)
What are the categories of access controls? Select three answers.

  • Authentication
  • Authorization
  • Administration
  • Accounting

Question 5)
What credential does OAuth use to authenticate users?

  • An application programming interface (API) token
  • A session cookie
  • A one-time passcode (OTP)
  • A digital certificate