Access Control Unit 2

Access Control Unit 2

11th - 12th Grade

70 Qs

quiz-placeholder

Similar activities

IBCA Semester Exam Review

IBCA Semester Exam Review

KG - University

66 Qs

Ôn tập Tin 12 (1-4)

Ôn tập Tin 12 (1-4)

12th Grade

73 Qs

CHỦ ĐỀ 4: SQL - Tin Học 11

CHỦ ĐỀ 4: SQL - Tin Học 11

11th Grade

65 Qs

OCR A Level Computer Science - 1.4.x

OCR A Level Computer Science - 1.4.x

12th Grade

67 Qs

Unity Certification Prep-Chapters 1-5

Unity Certification Prep-Chapters 1-5

12th Grade

74 Qs

All About ICT

All About ICT

3rd Grade - University

65 Qs

TIK KELAS 7

TIK KELAS 7

KG - University

70 Qs

AP CSP AP Test Study

AP CSP AP Test Study

9th - 12th Grade

68 Qs

Access Control Unit 2

Access Control Unit 2

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Used 24+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

70 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The process of restricting access to a resource to only permitted users

access control
cracked password
personal identification number (PIN)
registry

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Refers to the number of incorrect logon attempts permitted before a system locks an account. Each bad logon attempt is tracked by the bad logon counter

account lockout
Credential Guard
polymorphic virus
removable device

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Also known as auditing

accounting
decryption
principle of least privilege
residual risk

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The exposure

attack surface
digital signature
risk acceptance
risk mitigation

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Also known as accounting

auditing
Discretionary Access Control
risk assessment
risk transfer

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The process of identifying an individual

authentication
DMZ (demilitarized zone)
risk avoidance
risk

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The process of giving individuals access to system objects based on their identity.

authorization
DNS poisoning
risk management
Role

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?