T4Tutorials .PK

NSCT – Authentication & Access Control MCQs

1. . Authentication in information security is the process of:

(A) Verifying the identity of a user or system


(B) Encrypting data


(C) Deleting files


(D) Installing software




2. . Which of the following is NOT a type of authentication?

(A) Firewall


(B) Biometric


(C) Two-factor


(D) Password-based




3. . Two-Factor Authentication (2FA) combines:

(A) Only a username


(B) Two passwords only


(C) Only a fingerprint


(D) Something you know and something you have




4. . Multi-Factor Authentication (MFA) adds:

(A) Only encryption


(B) Only faster internet


(C) One or more verification methods beyond 2FA


(D) Only system updates




5. . Biometric authentication includes:

(A) Username only


(B) Fingerprint, facial recognition, and iris scan


(C) Password only


(D) IP address filtering




6. . Access control ensures that:

(A) All users can access everything


(B) Users can access only resources they are authorized to use


(C) Files are deleted automatically


(D) Network speed is increased




7. . Role-Based Access Control (RBAC) assigns permissions based on:

(A) IP addresses


(B) Device type


(C) User roles


(D) File size




8. . Discretionary Access Control (DAC) allows:

(A) Resource owners to set access permissions


(B) System administrators only to set permissions


(C) No control for users


(D) Firewall to manage access




9. . Mandatory Access Control (MAC) is:

(A) Only for network devices


(B) Set by users individually


(C) Optional for files


(D) Controlled by the system based on security labels




10. . Principle of Least Privilege means:

(A) Users have only the minimum access needed for their tasks


(B) Users have full administrative access


(C) Everyone shares passwords


(D) Access is granted randomly




11. . Authentication can be strengthened using:

(A) Default system accounts


(B) Weak passwords


(C) Public Wi-Fi


(D) Strong passwords, MFA, and biometrics




12. . Single Sign-On (SSO) allows:

(A) Encrypting data automatically


(B) Deleting all accounts at once


(C) Users to access multiple systems with one set of credentials


(D) Logging out all users simultaneously




13. . Session management in access control ensures:

(A) Automatic file deletion


(B) Secure handling of user sessions


(C) Faster internet


(D) Installing software automatically




14. . Token-based authentication uses:

(A) Firewall rules


(B) Password only


(C) IP address filtering


(D) A unique token issued to a user for access




15. . Access control lists (ACLs) are used to:

(A) Increase CPU speed


(B) Encrypt files


(C) Delete old accounts


(D) Define permissions for users or groups on system resources




16. . Single-factor authentication relies on:

(A) One method of verification, usually a password


(B) Two passwords


(C) Biometrics only


(D) Firewall rules




17. . Privilege escalation attacks target:

(A) Gaining higher access than authorized


(B) Encrypting files


(C) Deleting malware


(D) Slowing internet speed




18. . Examples of authentication factors include:

(A) Knowledge, possession, inherence


(B) File type, browser, IP address


(C) Hardware only


(D) Network speed




19. . Session hijacking occurs when:

(A) Network speed increases


(B) Files are deleted automatically


(C) An attacker takes control of a user session


(D) System updates fail




20. . The main goal of authentication and access control is to:

(A) Ensure only authorized users can access resources


(B) Increase storage space


(C) Compress files


(D) Improve graphics




Exit mobile version