Chapter 10.	Access Control Methods and Models

Chapter 10. Access Control Methods and Models

University

30 Qs

quiz-placeholder

Similar activities

QUIZ ON NON VERBAL COMMUNICATION

QUIZ ON NON VERBAL COMMUNICATION

University

25 Qs

Video Games

Video Games

KG - University

28 Qs

Copyrights issue

Copyrights issue

University

26 Qs

CCC4 Chapter 1 - Introduction to Computers

CCC4 Chapter 1 - Introduction to Computers

University

25 Qs

Industrial Relations Act, Chapter 88:01

Industrial Relations Act, Chapter 88:01

University

25 Qs

Arduino

Arduino

University

25 Qs

Cableado Estructurado | Proyectos e Instalaciones

Cableado Estructurado | Proyectos e Instalaciones

University

25 Qs

Advanced Game Design Midterm

Advanced Game Design Midterm

University

25 Qs

Chapter 10.	Access Control Methods and Models

Chapter 10. Access Control Methods and Models

Assessment

Quiz

Computers, Professional Development, Specialty

University

Practice Problem

Medium

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the strongest password?

|ocrian#
Marqu1sD3S0d
This1sV#ryS3cure
Thisisverysecure

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of these is a security component of Windows?

UAC
UPS
Gadgets
Control Panel

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What key combination helps to secure the logon process?

Windows+R
Ctrl+Shift+Esc
Ctrl+Alt+Del
Alt+F4

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the most common authentication model?

Username and password
Biometrics
Key cards
Tokens

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following access control methods uses rules to govern whether object access will be allowed? (Select the best answer.)

Rule-based access control
Role-based access control
Discretionary access control
Mandatory access control

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When using the mandatory access control model, what component is needed?

Labels
Certificates
Tokens
RBAC

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following statements regarding the MAC model is true?

Mandatory access control is a dynamic model.
Mandatory access control enables an owner to establish access privileges to a resource.
Mandatory access control is not restrictive.
Mandatory access control users cannot share resources dynamically.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?