Chapter 10.	Access Control Methods and Models

Chapter 10. Access Control Methods and Models

University

30 Qs

quiz-placeholder

Similar activities

NETWORK SECURITY

NETWORK SECURITY

University

25 Qs

Cys quiz 1

Cys quiz 1

University

25 Qs

Tech Fundamentals Quiz

Tech Fundamentals Quiz

6th Grade - University

30 Qs

Cryptography Quiz 1

Cryptography Quiz 1

University

25 Qs

Round 2

Round 2

University

25 Qs

Match the following

Match the following

University

28 Qs

CCC19 - Chapter 6 - Internet and WWW

CCC19 - Chapter 6 - Internet and WWW

University

25 Qs

Keamanan Jaringan dan Firewall

Keamanan Jaringan dan Firewall

University

25 Qs

Chapter 10.	Access Control Methods and Models

Chapter 10. Access Control Methods and Models

Assessment

Quiz

Computers, Professional Development, Specialty

University

Medium

Used 12+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the strongest password?
|ocrian#
Marqu1sD3S0d
This1sV#ryS3cure
Thisisverysecure

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of these is a security component of Windows?
UAC
UPS
Gadgets
Control Panel

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What key combination helps to secure the logon process?
Windows+R
Ctrl+Shift+Esc
Ctrl+Alt+Del
Alt+F4

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the most common authentication model?
Username and password
Biometrics
Key cards
Tokens

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following access control methods uses rules to govern whether object access will be allowed? (Select the best answer.)
Rule-based access control
Role-based access control
Discretionary access control
Mandatory access control

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When using the mandatory access control model, what component is needed?
Labels
Certificates
Tokens
RBAC

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following statements regarding the MAC model is true?
Mandatory access control is a dynamic model.
Mandatory access control enables an owner to establish access privileges to a resource.
Mandatory access control is not restrictive.
Mandatory access control users cannot share resources dynamically.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?