LESSON 5

LESSON 5

University

10 Qs

quiz-placeholder

Similar activities

Vehicle Telematics

Vehicle Telematics

12th Grade - Professional Development

15 Qs

Siemens Servo

Siemens Servo

University - Professional Development

12 Qs

Normalization with ERD Part #2

Normalization with ERD Part #2

University

11 Qs

Checkpoint 2 Review - 12 A

Checkpoint 2 Review - 12 A

12th Grade - University

10 Qs

LCSM_Formal_Informal_Learning

LCSM_Formal_Informal_Learning

University

10 Qs

Creating tables in HTML

Creating tables in HTML

University

10 Qs

OSI Model

OSI Model

University

15 Qs

Database Systems

Database Systems

University

15 Qs

LESSON 5

LESSON 5

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Lilibeth Antonio

Used 11+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It is the method by which systems determine whether and how to admit a user into a trusted area of the organization

Internet Access

Access Control

Control List

None of the these

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Access control cannot be applied to limit physical access to campuses, buildings, rooms, and data centers

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It grants access based on defined business functions rather than the individual user’s identity.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In this method, the owner or administrator of the protected system, data, or resource sets the policies for who is allowed access.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It’s common in government and military environments.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Attribute-based access control draws on a set of characteristics called “attributes.”

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Instructional Technology