What authentication method uses fingerprints, retinal scans, or facial recognition? | Card: 1 / 58 |
Which Windows edition is required for BitLocker encryption? A) Home B) Pro C) Starter D) Basic | Card: 5 / 58 |
A user receives high CPU usage from 'miner.exe' process. What malware type is present? | Card: 11 / 58 |
True or False: Standard users can install system drivers without administrator privileges. | Card: 15 / 58 |
Which wireless security standard should be the minimum acceptable today? A) WEP B) WPA C) WPA2 D) Open | Card: 19 / 58 |
_____ uses fake emails to steal credentials by impersonating legitimate organizations. | Card: 23 / 58 |
![]() Unlock all Flashcards with EduRev Infinity Plan Starting from @ ₹99 only |
An employee follows someone through a secure door without badging. What attack is this? | Card: 31 / 58 |
_____ _____ centralizes Windows authentication and uses domains to organize resources. | Card: 35 / 58 |
Which authentication factors include passwords and PINs? A) Something you know B) Something you have C) Something you are | Card: 41 / 58 |
A user cannot access a network folder they accessed yesterday. What should you check? | Card: 51 / 58 |
Which malware type spreads automatically across networks without user interaction? | Card: 53 / 58 |
True or False: Mobile device screen locks should timeout after 30-60 minutes for security. | Card: 57 / 58 |






