
Chapter 10. Access Control Methods and Models
Computers, Professional Development, Specialty
University
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the strongest password?
|ocrian#
Marqu1sD3S0d
This1sV#ryS3cure
Thisisverysecure
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of these is a security component of Windows?
UAC
UPS
Gadgets
Control Panel
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What key combination helps to secure the logon process?
Windows+R
Ctrl+Shift+Esc
Ctrl+Alt+Del
Alt+F4
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the most common authentication model?
Username and password
Biometrics
Key cards
Tokens
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following access control methods uses rules to govern whether object access will be allowed? (Select the best answer.)
Rule-based access control
Role-based access control
Discretionary access control
Mandatory access control
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When using the mandatory access control model, what component is needed?
Labels
Certificates
Tokens
RBAC
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following statements regarding the MAC model is true?
Mandatory access control is a dynamic model.
Mandatory access control enables an owner to establish access privileges to a resource.
Mandatory access control is not restrictive.
Mandatory access control users cannot share resources dynamically.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?