Search Header Logo

Access Control InClass Rvw

Computers

10th - 12th Grade

Used 2+ times

Access Control InClass Rvw
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The process of restricting access to a resource to only permitted users

access control
cracked password
personal identification number (PIN)
registry

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Refers to the number of incorrect logon attempts permitted before a system locks an account. Each bad logon attempt is tracked by the bad logon counter

account lockout
Credential Guard
polymorphic virus
removable device

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Also known as auditing

accounting
decryption
principle of least privilege
residual risk

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The process of identifying an individual

authentication
DMZ (demilitarized zone)
risk avoidance
risk

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An authentication method that identifies and recognizes people based on physical traits

biometrics
DNS spoofing
risk transfer
Secure Sockets Layer (SSL)

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A type of attack that tries as many possible combinations of characters as time and money permit.

brute force attack
domain user
Role
security baseline

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A form of attach which attempts all words in one or more dictionaries. Lists of common passwords are also typically tested.

dictionary attack
Honey net
sniffers
STRIDE

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?