Ch. 3 Review

Ch. 3 Review

11th Grade

32 Qs

quiz-placeholder

Similar activities

Trắc nghiệm Toán 8

Trắc nghiệm Toán 8

9th Grade - University

28 Qs

Module 24 - Portable Computing 2

Module 24 - Portable Computing 2

9th - 12th Grade

28 Qs

Creative iMedia R081 - Client requirements and Research

Creative iMedia R081 - Client requirements and Research

9th - 11th Grade

30 Qs

Scanners and Touch Screen Technologies (Pages 96-101)

Scanners and Touch Screen Technologies (Pages 96-101)

10th Grade - University

28 Qs

Higher AIT Revision

Higher AIT Revision

11th Grade

37 Qs

Bridge Course - Screening Test

Bridge Course - Screening Test

10th Grade - Professional Development

30 Qs

Ôn Tập Học Kì I Lớp 4

Ôn Tập Học Kì I Lớp 4

4th Grade - University

35 Qs

Mantenimiento de dispositivos móbiles - celular

Mantenimiento de dispositivos móbiles - celular

10th Grade - University

27 Qs

Ch. 3 Review

Ch. 3 Review

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Angelina CTA]

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

32 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The process of validating a user’s credentials is known as_____.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What describes a scenario in which an authorized user is denied access after using his or her fingerprint to gain access to a system?

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Often used in the military, this access level sets strict rules on data access.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The owner of the data assigns permissions in this access level control.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Best practices include giving a user the minimum access to perform their job. This concept is known as ____.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A database of network resources from Microsoft is called ____.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

When a user logs into the network, Kerberos issues ____ to gain access to resources.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?