Search Header Logo

Ch. 3 Review

Authored by Angelina CTA]

Computers

11th Grade

Used 4+ times

Ch. 3 Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

32 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The process of validating a user’s credentials is known as_____.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What describes a scenario in which an authorized user is denied access after using his or her fingerprint to gain access to a system?

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Often used in the military, this access level sets strict rules on data access.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The owner of the data assigns permissions in this access level control.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Best practices include giving a user the minimum access to perform their job. This concept is known as ____.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A database of network resources from Microsoft is called ____.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

When a user logs into the network, Kerberos issues ____ to gain access to resources.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?