LESSON 5

LESSON 5

University

10 Qs

quiz-placeholder

Similar activities

CCNA - ITN - 6.4.2

CCNA - ITN - 6.4.2

University

14 Qs

Instructional Technology and Educational Technology

Instructional Technology and Educational Technology

University

10 Qs

Computer Architecture

Computer Architecture

University

5 Qs

Quis Praktikum ERP - Mauliddini

Quis Praktikum ERP - Mauliddini

University

8 Qs

Object Linking for Process Control

Object Linking for Process Control

University

10 Qs

TICS I

TICS I

University

10 Qs

Understanding  the Basic Concepts in ICT

Understanding the Basic Concepts in ICT

University

10 Qs

Creating Web Pages

Creating Web Pages

University

10 Qs

LESSON 5

LESSON 5

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Lilibeth Antonio

Used 11+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It is the method by which systems determine whether and how to admit a user into a trusted area of the organization

Internet Access

Access Control

Control List

None of the these

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Access control cannot be applied to limit physical access to campuses, buildings, rooms, and data centers

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It grants access based on defined business functions rather than the individual user’s identity.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In this method, the owner or administrator of the protected system, data, or resource sets the policies for who is allowed access.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It’s common in government and military environments.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Attribute-based access control draws on a set of characteristics called “attributes.”

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?