Search Header Logo

Unit 3 - Managing User Security - Pretest

Authored by Ms. Nennig

10th Grade - Professional Development

Used 14+ times

Unit 3 - Managing User Security - Pretest
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What best explains the process of authentication in computing?

confirming software is not pirated

process of validating data entry

determining signed certificates

process of validating a user

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is when different forms of authentication are combined.

One-time password

Behavioral biometrics

Multifactor authentication

False acceptance rate

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of access level grants additional rights beyond what is allowed a user’s assigned access level?

Mandatory Access Control

Discretionary Access Control

Role-Based Access Control

separation of duties

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the nontechnical control of mandatory vacations allow?

separation of duties

reducing the strain on network resources

providing for proper work-life balance

comparing network traffic levels to those when the user was present

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a right differ from a permission in computing?

right is the ability to perform an action, while permission is a specific ability within a right

right is given to everybody, while permission is granted as needed

right is a safe action, while permission may or may not be unsafe

right is needed to boot the computer, while permission is needed to log on

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of policy is configured on the server?

local

group

user

system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are share permissions?

allow a user to share a folder

means of controlling user access to the network

controls on which folders a user can access on the local computer

outdated network technology that should not be used

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?