Chapter 10.	Access Control Methods and Models

Chapter 10. Access Control Methods and Models

University

30 Qs

quiz-placeholder

Similar activities

Authentication and Security Protocols

Authentication and Security Protocols

University

35 Qs

Information Security (Kolokfiumi II, SK)

Information Security (Kolokfiumi II, SK)

University

30 Qs

202309 BMIT27x3 Revision Quiz 3

202309 BMIT27x3 Revision Quiz 3

University

28 Qs

IAS 2 Identity and Access Management Q5

IAS 2 Identity and Access Management Q5

University

25 Qs

CNET151 Chap 10 - Security Policies

CNET151 Chap 10 - Security Policies

11th Grade - University

25 Qs

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

Cybersecurity Knowledge Assessment

Cybersecurity Knowledge Assessment

University

25 Qs

Chapter	9.	Physical	Security	and	Authentication Models

Chapter 9. Physical Security and Authentication Models

University

35 Qs

Chapter 10.	Access Control Methods and Models

Chapter 10. Access Control Methods and Models

Assessment

Quiz

Computers, Professional Development, Specialty

University

Medium

Used 12+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the strongest password?
|ocrian#
Marqu1sD3S0d
This1sV#ryS3cure
Thisisverysecure

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of these is a security component of Windows?
UAC
UPS
Gadgets
Control Panel

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What key combination helps to secure the logon process?
Windows+R
Ctrl+Shift+Esc
Ctrl+Alt+Del
Alt+F4

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the most common authentication model?
Username and password
Biometrics
Key cards
Tokens

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following access control methods uses rules to govern whether object access will be allowed? (Select the best answer.)
Rule-based access control
Role-based access control
Discretionary access control
Mandatory access control

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When using the mandatory access control model, what component is needed?
Labels
Certificates
Tokens
RBAC

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following statements regarding the MAC model is true?
Mandatory access control is a dynamic model.
Mandatory access control enables an owner to establish access privileges to a resource.
Mandatory access control is not restrictive.
Mandatory access control users cannot share resources dynamically.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?