LESSON 5

LESSON 5

University

10 Qs

quiz-placeholder

Similar activities

Sec. 8: Amazon S3

Sec. 8: Amazon S3

University

10 Qs

EDIT 1303

EDIT 1303

University

10 Qs

Sec. 5: EC2 - Elastic Compute Cloud

Sec. 5: EC2 - Elastic Compute Cloud

University

7 Qs

QUIZ 1 : TTL 2022

QUIZ 1 : TTL 2022

University

10 Qs

QUIZ-2 MID Assignment

QUIZ-2 MID Assignment

University

10 Qs

QUIZ TEKNIK MICROPROCESSOR

QUIZ TEKNIK MICROPROCESSOR

University

11 Qs

E-TECH MODULE 5 QUIZ

E-TECH MODULE 5 QUIZ

University

15 Qs

[DIAGNOSTIC] What do we know about Digital Assessment Tools?

[DIAGNOSTIC] What do we know about Digital Assessment Tools?

University

10 Qs

LESSON 5

LESSON 5

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Lilibeth Antonio

Used 11+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It is the method by which systems determine whether and how to admit a user into a trusted area of the organization

Internet Access

Access Control

Control List

None of the these

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Access control cannot be applied to limit physical access to campuses, buildings, rooms, and data centers

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It grants access based on defined business functions rather than the individual user’s identity.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In this method, the owner or administrator of the protected system, data, or resource sets the policies for who is allowed access.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It’s common in government and military environments.

Mandatory access control

Role-based access control

Attribute-based access control

Discretionary access control

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Attribute-based access control draws on a set of characteristics called “attributes.”

TRUE

FALSE

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?