
Ch. 3 Review
Authored by Angelina CTA]
Computers
11th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
32 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
The process of validating a user’s credentials is known as_____.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What describes a scenario in which an authorized user is denied access after using his or her fingerprint to gain access to a system?
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Often used in the military, this access level sets strict rules on data access.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The owner of the data assigns permissions in this access level control.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Best practices include giving a user the minimum access to perform their job. This concept is known as ____.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A database of network resources from Microsoft is called ____.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
When a user logs into the network, Kerberos issues ____ to gain access to resources.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?