NSCT – Authentication & Access Control MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Authentication in information security is the process of: (A) Verifying the identity of a user or system (B) Encrypting data (C) Deleting files (D) Installing softwareShow All Answers 2. . Which of the following is NOT a type of authentication? (A) Firewall (B) Biometric (C) Two-factor (D) Password-based 3. . Two-Factor Authentication (2FA) combines: (A) Only a username (B) Two passwords only (C) Only a fingerprint (D) Something you know and something you have 4. . Multi-Factor Authentication (MFA) adds: (A) Only encryption (B) Only faster internet (C) One or more verification methods beyond 2FA (D) Only system updates 5. . Biometric authentication includes: (A) Username only (B) Fingerprint, facial recognition, and iris scan (C) Password only (D) IP address filtering 6. . Access control ensures that: (A) All users can access everything (B) Users can access only resources they are authorized to use (C) Files are deleted automatically (D) Network speed is increased 7. . Role-Based Access Control (RBAC) assigns permissions based on: (A) IP addresses (B) Device type (C) User roles (D) File size 8. . Discretionary Access Control (DAC) allows: (A) Resource owners to set access permissions (B) System administrators only to set permissions (C) No control for users (D) Firewall to manage access 9. . Mandatory Access Control (MAC) is: (A) Only for network devices (B) Set by users individually (C) Optional for files (D) Controlled by the system based on security labels 10. . Principle of Least Privilege means: (A) Users have only the minimum access needed for their tasks (B) Users have full administrative access (C) Everyone shares passwords (D) Access is granted randomly 11. . Authentication can be strengthened using: (A) Default system accounts (B) Weak passwords (C) Public Wi-Fi (D) Strong passwords, MFA, and biometrics 12. . Single Sign-On (SSO) allows: (A) Encrypting data automatically (B) Deleting all accounts at once (C) Users to access multiple systems with one set of credentials (D) Logging out all users simultaneously 13. . Session management in access control ensures: (A) Automatic file deletion (B) Secure handling of user sessions (C) Faster internet (D) Installing software automatically 14. . Token-based authentication uses: (A) Firewall rules (B) Password only (C) IP address filtering (D) A unique token issued to a user for access 15. . Access control lists (ACLs) are used to: (A) Increase CPU speed (B) Encrypt files (C) Delete old accounts (D) Define permissions for users or groups on system resources 16. . Single-factor authentication relies on: (A) One method of verification, usually a password (B) Two passwords (C) Biometrics only (D) Firewall rules 17. . Privilege escalation attacks target: (A) Gaining higher access than authorized (B) Encrypting files (C) Deleting malware (D) Slowing internet speed 18. . Examples of authentication factors include: (A) Knowledge, possession, inherence (B) File type, browser, IP address (C) Hardware only (D) Network speed 19. . Session hijacking occurs when: (A) Network speed increases (B) Files are deleted automatically (C) An attacker takes control of a user session (D) System updates fail 20. . The main goal of authentication and access control is to: (A) Ensure only authorized users can access resources (B) Increase storage space (C) Compress files (D) Improve graphics